{"id":4923,"date":"2015-06-15T08:42:35","date_gmt":"2015-06-15T12:42:35","guid":{"rendered":"http:\/\/me-en.kaspersky.com\/blog\/?p=4923"},"modified":"2019-11-15T15:24:30","modified_gmt":"2019-11-15T11:24:30","slug":"telegraph-grandpa-of-internet","status":"publish","type":"post","link":"https:\/\/me-en.kaspersky.com\/blog\/telegraph-grandpa-of-internet\/4923\/","title":{"rendered":"The telegraph, Internet&#8217;s Grandpa: the beginning of the information era"},"content":{"rendered":"<p>Every time you speak about how the great revolution in the principles of data transmission and the information security principles was sparked by the Internet, make sure to remember one thing: There were preceding revolutions, which were comparable to the Internet in terms of magnitude. In this context, many reference print press, and some refer to radio or TV.<\/p>\n<p>However, it would be much fairer to remember the telegraph in this respect. The telegraph was the very first technology that enabled \u2013 literally \u2013 instant data transmission, and the electric telegraph, for the first time ever, employed electric signal for this purpose.<\/p>\n<p>Today it might seem strange, but the ability to radically speed up data transmission was not appreciated immediately. Telegraph companies had to invest a lot of time and effort in order to prove the true value of their solution to their fellow men.<\/p>\n<p>So, what are the information security issues that people resolved in the telegraph\u2019s golden age? What were the phenomena the telegraph helped to create back then? And which of those are still up-to-date for us?<\/p>\n<h3>1. The communication provider phenomenon and government surveillance<\/h3>\n<p>The message was no longer directly attributed to any hard copy. The contents have became ephemeral: one cannot put signals in a pocket, after all. But at the same time it could be registered physically on both sides of the wire, as delivery reports and message forms.<\/p>\n<p>Moreover, speaking of the telegraph as a commercial service, it was then that a \u2018communication provider\u2019 (a provider who has access to customers\u2019 communications) phenomenon was forged. Of course, prior to the telegraph there was post, which could also potentially access customers\u2019 messages, but postmen did not need to effectively read the contents of messages in order to function. With the telegraph, this \u2018interception\u2019 was essential.<\/p>\n<p>Then the new requirement, so well-known to us thanks to communication control systems like SORM or PRISM, emerged: some countries obliged telegraph companies to keep message forms in order for the police to examine those when needed for investigations.<\/p>\n<h3>2. Interception and steganography<\/h3>\n<p>If the process of clandestinely intercepting a written letter without leaving any trace required a great deal of skill, a telegraph cable was initially exposed to hidden interception. In the early days of the telegraph\u00a0<a href=\"https:\/\/www.kaspersky.com\/blog\/cameron-against-encryption\/\" target=\"_blank\" rel=\"noopener nofollow\">governments banned encryption<\/a>, and that fueled up the development of steganography, or a principle of encoding a message into an innocent-looking text.<\/p>\n<p>Such messages employed both enhanced signals (like \u201cSir, your baggage and tartan plaid will await you at the station\u201d where \u2018tartan\u2019 stood for the name of the horse which won the derby in 1840) and more sophisticated schemes.<\/p>\n<p>For instance, back in the times of the optical semaphore telegraph, there was a case when a group of bankers bribed a telegrapher to let certain typos remain in the text in order to convey coded messages about trends on the stock exchange.<\/p>\n<p>As part of the scheme, the bankers secretly surveilled a telegraph semaphore on the Paris \u2013 Toulouse connection to get the critical information in both encrypted and completely \u2018wireless\u2019 manner. Good old days; it was that simple then.<\/p>\n<h3>3. \u2018Hackers\u2019 vs. Police: arms race<\/h3>\n<p>Now, there is an abundance of stories about \u2018hackers\u2019 successfully exploiting the least probable vulnerabilities or, vice versa, about criminals who were careless and failed to get rid of their \u2018information fingerprints\u2019, and eventually got caught.<\/p>\n<p>With the telegraph, people had to adapt to the reality that any message could be instantly delivered over long distance. The aforementioned story of the \u2018tartan\u2019 plaid is a fascinating case, not only due to the cipher the interlocutors employed. The bookmaker did not even consider a probability of fast data transmission by the telegraph.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4925\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/06\/05103825\/telegraph-2.jpg\" alt=\"telegraph-2\" width=\"1280\" height=\"943\"><\/p>\n<p>Quite similar to today\u2019s reality, the new tech favored both scammers and the police. One of the cases which greatly impressed the governors and motivated them to approve wide-scale use of the telegraph was a simple case of capturing a train thief.<\/p>\n<p>It was utterly elegant: the thief was caught at the next station along the track, as the message about him was transmitted over the telegraph. Before that, there was no way for the police or the train station administration to send a message faster than the train travelled.<\/p>\n<h3>4. The binary code<\/h3>\n<p>After some to and fros, the telegraph widely employed Morse code, which was based on the use of short and long signals (dots and dashes) for encoding letters and numbers. In essence, they were the \u2018ones\u2019 and \u2018zeros\u2019 of those times.<\/p>\n<p>However, Morse code was not based on the binary system and did not survive the migration from analog to digital communications. Still, it was Morse code which founded the principles of using simple and easily distinguishable signals to encode messages.<\/p>\n<p>It was enough just to comprehend the properties, capabilities, and logic of the binary system in order to make it the foundation of today\u2019s computing principle.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-4926\" src=\"https:\/\/media.kasperskydaily.com\/wp-content\/uploads\/sites\/37\/2015\/06\/05103823\/telegraph-3.jpg\" alt=\"telegraph-3\" width=\"1280\" height=\"869\"><\/p>\n<h3>5. Retention of messages<\/h3>\n<p>Back in the 1870s, as the government loosened its grip on encryption, the so-called \u2018commercial ciphers\u2019 emerged. In fact, they were just glossaries containing code words for conveying certain combinations, phrases, or even sentences.<\/p>\n<p>Such ciphers were elaborated by certain organizations or enterprises to cater to their own communication needs, and were also sold for public use. They did not guarantee any protection from a targeted breach, but helped to make messages a bit less explicit and limit their exposure to others.<\/p>\n<p>But since code words were often made-up or represented a random combination of letters, telegraphers often made mistakes. Back in 1887, a man sent a message to his business partner: \u2018bought all kinds of wool, 50,000 pounds\u2019 which was coded as \u2018BAY ALL KINDS QUO\u2019. The telegrapher made a mistake, unwittingly replacing one letter, and made the message read as \u2018BUY ALL KINDS QUO\u2019, which was interpreted as \u2018buy all kinds of wool, 50,000 pounds\u2019 on the other end of the wire.<\/p>\n<p>When that mistake was discovered, the partners had to quickly sell the surplus; the market eventually dropped and the companions lost a lot of money. In their attempts to sue the telegraph company never did they succeed. The only cost they were able to recover was the cost of the telegram itself. Trying to find the responsible party, they even took the case to the Supreme Court.<\/p>\n<p>For the purpose of checking the message for such mistakes, a checksum is used: it helps to verify whether two files match. Back in those times, telegraph companies charged extra for the service of checking whether the sent and the received message matched.<\/p>\n<blockquote class=\"twitter-pullquote\"><p>The story of how the telegraph influenced modern IT infrastructure and information security<\/p><a href=\"https:\/\/twitter.com\/share?url=https%3A%2F%2Fkas.pr%2Fn35B&amp;text=The+story+of+how+the+telegraph+influenced+modern+IT+infrastructure+and+information+security\" class=\"btn btn-twhite\" data-lang=\"en\" data-count=\"0\" target=\"_blank\" rel=\"noopener nofollow\">Tweet<\/a><\/blockquote>\n<p>The last telegraph company which employed traditional \u2018electric\u2019 infrastructure was India\u2019s BSNL; it ceased operations in 2013. The U.S.\u2019 Western Union stopped sending telegrams even before that. The telegraph gave up its role of critical communication infrastructure a very long time ago.<\/p>\n<p>Nevertheless, its prior role and lessons it taught deserve reverence. Tom Standage, whose book we referred to when preparing this material, called the telegraph\u00a0<a href=\"https:\/\/tomstandage.wordpress.com\/books\/the-victorian-internet\/\" target=\"_blank\" rel=\"noopener nofollow\">\u2018The Victorian Internet\u2019<\/a>, which is quite appropriate.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every time you speak about how the great revolution in the principles of data transmission and the information security principles was sparked by the Internet, make sure to remember one<\/p>\n","protected":false},"author":40,"featured_media":4924,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5],"tags":[1014,261,546,1015,97,1016],"class_list":{"0":"post-4923","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-news","8":"tag-communication","9":"tag-encryption","10":"tag-history","11":"tag-information","12":"tag-security-2","13":"tag-telegraph"},"hreflang":[{"hreflang":"en-ae","url":"https:\/\/me-en.kaspersky.com\/blog\/telegraph-grandpa-of-internet\/4923\/"},{"hreflang":"en-us","url":"https:\/\/usa.kaspersky.com\/blog\/telegraph-grandpa-of-internet\/5452\/"},{"hreflang":"es-mx","url":"https:\/\/latam.kaspersky.com\/blog\/telegraph-grandpa-of-internet\/5641\/"},{"hreflang":"es","url":"https:\/\/www.kaspersky.es\/blog\/telegraph-grandpa-of-internet\/6273\/"},{"hreflang":"it","url":"https:\/\/www.kaspersky.it\/blog\/telegraph-grandpa-of-internet\/6207\/"},{"hreflang":"ru","url":"https:\/\/www.kaspersky.ru\/blog\/telegraph-grandpa-of-internet\/8106\/"},{"hreflang":"x-default","url":"https:\/\/www.kaspersky.com\/blog\/telegraph-grandpa-of-internet\/9034\/"},{"hreflang":"pt-br","url":"https:\/\/www.kaspersky.com.br\/blog\/telegraph-grandpa-of-internet\/5431\/"},{"hreflang":"de","url":"https:\/\/www.kaspersky.de\/blog\/telegraph-grandpa-of-internet\/5566\/"},{"hreflang":"ja","url":"https:\/\/blog.kaspersky.co.jp\/telegraph-grandpa-of-internet\/7928\/"},{"hreflang":"ru-kz","url":"https:\/\/blog.kaspersky.kz\/telegraph-grandpa-of-internet\/8106\/"},{"hreflang":"en-au","url":"https:\/\/www.kaspersky.com.au\/blog\/telegraph-grandpa-of-internet\/9034\/"},{"hreflang":"en-za","url":"https:\/\/www.kaspersky.co.za\/blog\/telegraph-grandpa-of-internet\/9034\/"}],"acf":[],"banners":"","maintag":{"url":"https:\/\/me-en.kaspersky.com\/blog\/tag\/communication\/","name":"communication"},"_links":{"self":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/comments?post=4923"}],"version-history":[{"count":1,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4923\/revisions"}],"predecessor-version":[{"id":14945,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/posts\/4923\/revisions\/14945"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media\/4924"}],"wp:attachment":[{"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/media?parent=4923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/categories?post=4923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/me-en.kaspersky.com\/blog\/wp-json\/wp\/v2\/tags?post=4923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}