Category Techniques

What is the difference between a code and a cipher?

Codes and ciphers are different ways of encrypting a message to ensure secrecy and security. How do they work?

Codes and ciphers are both techniques used to transform messages into a seemingly illegible form so that only selected people can understand them. thereby ensuring secrecy and security

A cipher is a more basic form of encryption. It involves the rearrangement or substitution of the letters of the alphabet in the message. On the other hand, the code works on a higher level of encryption. It replaces entire words or phrases with secret words or numbers.

Consider a simple message: ‘The ship has left the port.’

Now, if each letter is replaced by a number, for example.

 A=1, B-2, C-3 and so on, the message will become

20-8-5  19-8-9-16  8-1-19  12-5-6-20  20-8-5  16-15-18-20. This is a cipher.

Now, if the ship' is replaced by the word Alpha' and the phrase 'has left the port’ by the number '1', then the code would be 'Alpha 1'.

Picture Credit : Google 

What is meaning of term ‘Painting with words’?

The technical advancement in Artificial intelligence or Al has helped recognise CT scans for doctors, predict oil deposits for engineers, and create and regulate algorithms among other things. But can Al generate art?

Creating art takes a unique combination of skills, creativity and the very human element of aesthetic taste. In April 2022, OpenAl, an artificial intelligence (AI) research laboratory, came up with a text-to-image generator that can draw anything you want virtually. This has been done before but the difference here is that the fleshed-out painting or images created by this system replicated the aesthetic design and taste of a real artist. This new Al system is called Dall-E 2 and is capable of turning any text description into a unique work of art. This is an updated system of Dall-E which was released by the company last year. The high-quality and high-resolution images generated by Dall- E 2 are completed within 10 seconds after one enters the prompts and also feature complex backgrounds, realistic depth, and shadow effects, shading and reflections. This free-for-all Al-powered software has made art more accessible, giving everyone a platform to create pictures with words without having to actually execute them with paint, cameras, or code.

Picture Credit : Google 

How to do Safety check in Google Chrome?

Chrome comes with a built-in tool to check for enhanced protection. Head over to Chrome Settings, and click on the Safety Check button on the left sidebar. Alternatively, you can go to chrome://settings/safetyCheck to access the safety check page directly. The Safety Check tool will then verify that Chrome is up-to-date, cross-check whether all your stored passwords are complex and not leaked in any data breaches, and confirm that Safe Browsing is set up properly. It will even check if you are protected from any potentially malicious extensions. Run it once in a while.

With this check Chrome will check all your stored passwords are complex and not leaked in the previous data breaches. In order to do this check, you have to login with your Google account. It helps Google to send the passwords in encrypted manner and check the database to match if the password is in the previous data breaches.

The result of the safe browsing section depends on the level of protection you have enabled on your browser. By default, Chrome will use the standard protection and hence you will see a message like “Standard protection is on. For even more security, use enhanced protection.”

 

Picture Credit : Google

What is deepfake app?

Deepfake generally refers to images on videos in which the face and/or voice of a person, usually a public figure has been manipulated using artificial intelligence software to generate visual and audio content with a high potential to deceive. Deepfakes are a source of concern because they are created to be intentionally misleading, such as by making it look like a politician said something they didn’t, or making it appear like a celebrity was in a video they weren’t in.

Everyone from academic and industrial researchers to amateur enthusiasts, visual effects studios and porn producers. Governments might be dabbling in the technology, too, as part of their online strategies to discredit and disrupt extremist groups, or make contact with targeted individuals, for example.

It is hard to make a good deepfake on a standard computer. Most are created on high-end desktops with powerful graphics cards or better still with computing power in the cloud. This reduces the processing time from days and weeks to hours. But it takes expertise, too, not least to touch up completed videos to reduce flicker and other visual defects. That said, plenty of tools are now available to help people make deepfakes. Several companies will make them for you and do all the processing in the cloud. There’s even a mobile phone app, Zao, that lets users add their faces to a list of TV and movie characters on which the system has trained.

 

Picture Credit : Google

What is special in Orixo game?

Orixo is a relaxing, minimalist brain game with over 320 hand-crafted levels to help sharpen your mind. A melodic soundtrack accompanies you on the levels, all of which are free to play and vary in difficulty. Fill the grid by dragging your finger over cells with a number inside of it. The number represents the number of cells it will fill in one of four directions. The direction you choose counts. Orixo saves your game progress automatically and hints are available in case you get stuck on any level. A simple game to play for a few minutes to take a breather from your busy life. Free for iOS and Android.

The organization of ideas and things are both important to this game. The player has to be able to think through and organize which number should be swiped first, second, etc. They also need to organize the placement, or direction, of the swipe. If they don’t take the time to organize both aspects of this game, they will be unable to complete a level and unlock new ones.

 

Picture Credit : Google

WOWcube reimagines the Rubik’s Cube for a next-gen gaming console

The WOWcube, a new twist on the beloved Rubik’s Cube, is the brainchild of 13-year-old DIY YouTuber, Savva Osipov. “What if we place characters and gameplay on Rubik’s Cube surface and control the game by twisting, tilting and shaking,” he thought. Together with his father, inventor Ilya, they came up with the WOWcube. The device comes with tiny, high-res microdisplays built into each of the cube’s 24 square-shaped segments, and eight processors and an accelerometer on the inside. As with a Rubik’s Cube, users can twist, flip, turn, and rotate elements along multiples axes, constantly changing how the screens align with one another, all accompanied by satisfying clicks. Its accompanying iOS/Android app allows users to load a number of games, including word games, puzzles, mazes and arcade-style games, into the device via Bluetooth. It runs on an open-source API (application programming interface) that enables youngsters with computer skills and developers to design their own games for the WOWcube. Place the device onto its charging base and the cube’s individual screens become functional widgets, displaying the date, time, weather, social media, notifications, news and more. The STEM-learning certified device measures 2.8 inches on each side and weighs 335 gms. Its integrated 4,320 mAh lithium-ion battery runs for upto eight hours on a single charge.

 

Picture Credit : Google

What is Scribbl app?

Scribbl offers a cool way to spruce up your images and videos with effects and animations. Draw striking scribble type animations over static pictures or tap on the animation of your choice and add it over videos. Change the colour, size and position of the animation, customize your art brush and edit your effects easily. Scribbl also lets you add a glow animation to achieve a neon sign or lightning effect. Export your animation in full HD quality for your social media posts and show off your creative side to your friends. You can even get your work featured in the app’s home page. Free for iOS and Android.

Scribbl is an animation maker which allows you to draw animations on your images to achieve the Scribble Animation effect. We’ve simplified the process of animating your images, forget drawing frame by frame, you can easily create an awesome effect just by drawing over your picture once.

Scribbl gives you the option to customize your art brush. Play around with different sizes and styles. Scribbl also has the cool feature of adding glow animation to achieve that awesome neon sign or lightning effect.

Once you’re done drawing your animation, you can export it in Full HD quality for your social media posts. Forget boring static images or videos without that extra flair for your Facebook, TikTok, Snapchat and Instagram stories and posts, download Scribbl now and show off your creative side to the world with crazy animations!

 

Picture Credit : Google

How to view all the websites on Instagram?

Fortunately, Instagram had the sense to include a way to rediscover these websites or links in your profile for later perusal. You can now view all websites you have opened on Instagram in a single location. Let’s find out how to use the official Instagram apps for Android and iOS. This won’t work on the Instagram web app.

That doesn’t mean that the desktop or web app is completely redundant. You can still check your DMs or view Instagram stories. While everything said, putting links in the comments or an Instagram post is still a tricky affair. You’ll need at least 10,000 users to post a link inside your Instagram stories.

If you ever need to revisit a product or blog link on Instagram, you don’t have to find the original post or account from last time. Tap on your profile icon at the bottom of the screen, and then on the hamburger icon at the top right. Select Your Activity’ from the menu. You will find all opened links under the Links tab arranged date-wise, starting from the most recent; and tap on any link to open it again in Instagram’s in app browser. (The Time tab tells you how much time you spent scrolling through your feeds mindlessly!)

 

Picture Credit : Google

What is Google Look to Speak app?

Google’s experimental app, Look to Speak, helps people with speech and motor impairments communicate by using their eyes to select pre-written phrases and have them spoken aloud by their smartphones. After positioning the phone slightly below eye level, a user looks left, right or up to choose from a list of phrases, which the device then speaks aloud. Users can personalize words and phrases, so that they can share their authentic voice. The app is one of Google’s ‘Start with One, Invent for Many projects that all begin with one person trying to make something impactful for their community. “Now conversations can more easily happen where before there might have been silence,” says Richard Cave, speech and language therapist at Google.

Look to Speak is a ‘Start with One’ project on the “Experiments with Google” platform. It all started with an idea that could be impactful for one person and their community. Throughout the design process, we reached out to a small group of people who might benefit from a communication tool like this. What was amazing to see was how Look To Speak could work where other communication devices couldn’t easily go—for example, in outdoors, in transit, in the shower and in urgent situations. Now conversations can more easily happen where before there might have been silence, and I’m excited to hear some of them.

 

Picture Credit : Google

Garbage Watch made from upcycled e-waste

The Garbage Watch is a functional watch made out of upcycled e-waste. “Today, most of the 50 million tonnes of electronic waste that’s generated every year is treated like garbage even though it isn’t. Instead it contains many of the world’s precious metals, like silver, platinum, copper, nickel, cobalt, aluminium and zinc. You’ll find 7% of the world’s gold in e-waste,” says Vollebak, the company behind the watch. “Everything you can see on the Garbage Watch used to be something else a motherboard from your computer, a microchip in your smartphone, or wiring from your TV.” Of the unique design, the company says, “We’ve taken an ‘inside- out design approach with the Garbage Watch, making the functional inner workings highly visible… Our aim was to reframe an often invisible and hazardous end of the supply chain, and make people think deeply about the impact of treating their wearables in a disposable manner.”

 

Picture Credit : Google

What is dawn minimal calendar?

Dawn is a minimalistic calendar app that aims to be your central point for remembering and getting things done. It lets you sync your calendars and reminder lists, and sort, categorize, and filter your events. Create unique Spaces to organize different aspects of your life – group tasks, create itineraries, manage projects, plan vacations, and more. Dawn’s Today page is an adaptive homepage that changes as your day goes by. Quickly add tasks to your day and check off tasks you’ve completed. Never miss a thing with multiple reminders. Pinpoint busy days with Calendar Heatmap and day summaries. Free for iOS.

The app lets you organise yourself effortlessly and gives you some interesting unique features to focus on your objectives.

  • Pinpoint your busy days with heatmaps and day summaries.
  • Manage everything in one place with integrated to-dos.
  • Keep your days organized with the ability to add subtasks.
  • Sync events with Apple’s native Calendar and Reminder apps

 

Picture Credit : Google

How to remove disruptive participants on Zoom?

The first rule of Zoom Club: Don’t give up control of your screen. 

You do not want random people in your public event taking control of the screen and sharing unwanted content with the group. You can restrict this — before the meeting and during the meeting in the host control bar — so that you’re the only one who can screen-share.

Zoom allows meeting hosts to pause a meeting and remove unruly participants and Zoombombers (pranksters who invade calls). Click on the ‘Suspend Participant Activities’ feature under the Security icon. All video, audio, in-meeting chat, screen sharing and recording during that time will stop. An unruly participant’s details along with an optional screenshot can be shared with Zoom. Once you click ‘Submit’, the reported user will be removed from the meeting, and a notification sent to Zoom’s Trust & Safety team. The feature is enabled by default for all free and paid Zoom users.

Zoom is a great way to stay connected right now, and we hope these tips will help you continue to host amazing events using our platform! If you’re not sure whether a public Zoom event is the way to go, share the meeting link only with your close friends, co-workers, and clients. You can even password-protect it for another layer of security.

 

Picture Credit : Google

What is tabnabbing?

Tabnabbing is a phishing attack that takes advantage of an idle tab in your internet browser. When a malicious script detects that the user has moved to another tab or has been inactive for some time, it quietly refreshes the idle background tab, redirecting it to a fake login page of a seemingly legitimate website. When you click on the tab, you’ll probably assume that you opened the site yourself. If you log in, your credentials are sent to the owner of the malicious website.

To prevent tabnabbing, keep as few tabs open as possible. Check the address bar for the correct url. Look out for differences between the page and the genuine site (e.g., spelling mistakes and unusual layouts).

Tabnabbing is a social engineering attack. It depends on the victim’s attentiveness and the ability of the hacker to con the victim into believing in his malicious site.

 

Picture Credit : Google

KeyChain – The world’s smallest 4K vlogging camera

KASO’s Keychain 4K is said to be the world’s smallest 4K vlogging camera. You can record for up to 60 minutes, take time lapses and slow motion captures and stills, courtesy of its 20-megapixel photo mode. The camera features 4K/30 fps recording capabilities, image stabilization, a 1240 field of view, six-axis, anti-shake technology, and hands-free shooting. It has six LED lights arranged around the lens to act as a flash to illuminate its subject. All this is packed into a 36-gram casing with an IP56 waterproof rating. KeyChain measures 63x33x18 mm with a micro SD card slot for storage and a USB-C slot for recharging. It comes with a pivot stand and mount base, a carry-on camera case, a magnet pendant and an easy clip to help you share your adventures by attaching it to your backpack or tee to record all you do. The accompanying app features editing and effects options, you can even reverse the entire video so it plays backwards. The ‘advanced edit suite allows for adding subtitles, stickers, doodles, placing another video/photo in the frame picture-in-picture style, adding music or increasing the speed.

 

Picture Credit : Google

“The world is in trouble,” so Sir David Attenborough has joined Instagram!

94-year-old natural historian and broadcaster, Sir David Attenborough said he’s joined Instagram because “saving our planet is now a communications challenge. We know what to do, we just need the will.” Attenborough reached a million Instagram followers in a record-breaking time: 4 hours 44 minutes. He currently has over 4.8 million followers.

“I’m making this move and exploring this new way of communication to me, because as we all know, the world is in trouble. Continents are on fire. Glaciers are melting. Coral reefs are dying. Fish are disappearing from our oceans. The list goes on and on and on,” added Attenborough. Attenborough will be using Instagram to share messages explaining the problems our planet is facing, and possible solutions for tackling those issues. To follow Sir David on Instagram, go to @David Attenborough.

 

Picture Credit : Google

Is zoom the same as Google meet?

Video calling apps like Zoom call it ‘sharing but Google Meet likes to call it ‘presenting’. That’s why you won’t find the share button in Meet. Instead, click on the ‘Present now button at the bottom of the screen to reveal sharing options. You can present your entire screen, a window or just a Chrome browser tab. Clicking on the window option will allow you to select any open window on your computer. That could be an open folder, file or an app The rest will stay hidden.

Since video conferences are no longer limited to desktops and laptops, both Google Meet and Zoom are available for mobile devices based on Android and iOS. Google Meet is also accessible directly through Chrome and other modern browsers and doesn’t require any additional plugins. You just need to visit meet.google.com to host a meeting. Similarly, you can participate in a scheduled meeting by visiting its link in your eligible browser. This isn’t the case with Zoom as it doesn’t allow you to host a meeting through a browser. Nevertheless, you can join a meeting via your browser. There are also plugins for Google Chrome and Mozilla Firefox that you can use to schedule your meeting.

Zoom is popular for its Gallery view that displays up to 49 participants on a single screen. However, Google Meet recently mimicked that interface by enabling an expanded tiled layout that simultaneously shows up to 16 participants at once. Google also recently added a low-light mode that uses artificial intelligence (AI) to adjust video on the basis of lighting conditions. The feature is initially limited to mobile users, though.

 

Picture Credit : Google

What is Restflix?

Getting enough sleep is an essential part of our health but sometimes it’s hard to turn your mind off at night. Restflix is designed to help users fall asleep faster and stay asleep through the night. It uses a technology called binaural beats’ to harness the brain’s responsiveness to sound and help create a restful state. The sleep streaming service offers over 20+ channels filled with hundreds of hours of soothing bedtime stories, music, meditations and dark screen videos that aim to ease anxiety OS and stress and fall into a peaceful slumber. Fall asleep to ocean sounds, o rainstorms and the chirp of nature, along with visual aids. Even if you’re not having trouble sleeping, Restflix is a helpful tool for relaxation. The app is compatible with iOS, Amazon Fire, Apple TV, Roku and Android.

Even if you’re not having trouble sleeping, Restflix can be a valuable tool to help you relax and develop a healing meditation practice.

The good news is that the reviews back up what it claims to do, too. Restflix has earned perfect 5-star ratings on both the Google Play Store and App Store because it really works. You don’t have to struggle to sleep each night and drag through each day. Get the best sleep of your life with Restflix. Right now, you can save big. Get 40 percent off a one-year subscription at just $29.99, 50 percent off a two-year subscription at $49.99, or 59 percent off a three-year subscription at $59.99.

 

Picture Credit : Google

A mask that integrates safety with hands-free access to your smartphone

Maskfone is a “hands-free” smart mask that allows wearers to take calls, listen to music, and access their virtual assistant without removing their protective barrier. It has medical-grade, replaceable PM 2.5 and N95 filters, IPX5 water resistance, adjustable neoprene rubber ear hooks, a cable clip and the fabric used is washable too. An internal microphone provides access to clearer voice calls thanks to background noise isolation, while a wireless Bluetooth headset offers 8-12 hours of playtime/listening, whether it be to music, podcasts, audio books or phone calls. It even allows the user to use voice projection while speaking to someone in person powered by Hubble M HASKFON connect app. Masfone is compatible with voice assistants like Alexa, Siri and Google Assistant, so users will be able to use it to control smart home appliances as well.

 

Picture Credit : Google

How dogs and machines sniff out drugs and explosives?

After five women form Bogota, Colombia, aroused suspicion at London’s Heathrow Airport in 1988, sniffer dogs were brought in to examine their luggage. The dogs led customs men to 20 LP records in each of the women’s suitcases. When the vinyl layers of the records were split open, cocaine was discovered sandwiched between the halves. A total of 16 kilos of the drug was found in the records and in the jackets of books. The women were all jailed for 14 years.

Sniffer dogs are used by police and customs throughout the world to detect drugs and explosives.

Dogs that are trained for the job include natural retrievers used in filed sports, such as Labradors, collies and spaniels. Dogs have a far better sense of smell than people because the smell receptors at the top of a dog’s nose are 100 times longer than in humans.

The training course for a sniffer dog normally lasts about 12 weeks. The dog is first taught to recognize a particular drug or explosive.

Its handler conceals a sample of the substance inside something the dog can grip in its mouth – a rolled-up newspaper, a piece of pipe or a rag – which is known as a training aid.

The dog is commanded to bring the aid back to the handler, and then receives a reward. The reward will be whatever that particular dog enjoys doing – usually a friendly fight with the handler or a game of hide-and-seek.

The dog learns to recognize the smell of the training aid, which is in fact the smell of the drug or explosive. The type of training aid is changed regularly, but the smell always remains the same. At fist the aid is placed within sight of the dog, but is then hidden out of sight.

Smells such as perfumes, which some smugglers spread to disguise the scent of drugs, are also used so that the dog becomes familiar with them.

A dog can eventually be trained to respond to up to 12 different types of explosives and four different types of drugs, usually cannabis, cocaine, heroin and amphetamine.

When a dog is sent out to search for drugs, perhaps in a lorry or warehouse, it is put into a special harness – a signal that it should start working. When it locates a smell which it knows will lead to a reward, it will become agitated and excited.

Other customs or police officers then take over.

The handler drops a training aid where the dog will see it and return it, and the dog then gets its reward.

Air samples

Machines that are used to detect drugs and explosives suck in air through a tube that can be inserted into concealed spaces such as petrol tanks, paneling in vehicles or gaps between walls.

They also take air samples from containers and lorries where drugs and explosives might be hidden.

The samples are analyzed by a machine called a mass spectrometer which breaks them down into their chemical parts and identifies minute traces of individual substances used in explosives or drugs.

It is claimed that traces as small as one-trillionth of a gram can be detected.

Electron movement

‘Sniffer’ machines large enough for people to walk through have been installed at the Houses of Parliament in London and at some international airports, including Seoul before the 1988 Olympic Games. They can detect dynamite or nitroglycerine, which gives off a vapour that attracts electrons. A current running through the sniffer machine detects the movement of the electrons.

 

Picture Credit : Google

When a new job depends upon your handwriting

Applicants for the job of deputy personnel of a computer company had been whittled down to two young men of equal experience, skill and qualifications. Outwardly, there seemed little to choose between them – so the interviewing board called in a graphologist, or handwriting analyst, to assess character and potential.

The handwriting of the first applicant was large, fluid and rounded, that of the second was small, sharp and angular. According to the graphologist, the first handwriting showed someone who was self-confident, flexible and who got on well with people. The second handwriting, however, portrayed someone who – despite his social and professional ‘front’ – was self-doubting and rigid. So the job went to the first applicant.

Graphologists maintain that handwriting – from public relations companies to banks – use expert handwriting analysts for sifting through job applicants, requests for promotion, and business ideas that come through the post. In West Germany 80 per cent of major companies employ graphologists for personnel selection. It is not widely used in Australia although the practice is growing around the world.

Its adherents claim that it is an effective way of deciding whether a person can be trusted. In the USA –where firms lose up to $40,000 million each year to dishonest employees – graphology has taken the place of polygraph, or lie detector tests, which are no longer legal.

Critics of graphology say that it has no firm validity. Not only are many handwriting experts self-trained but their evaluation are often found to contradict each other.

However, most graphologists agree on certain basic concepts – such as the importance of assessing character on a combination of several main factors, and not any one ‘peculiar’ characteristic.

They divide handwriting into three ‘zones’: the upper and lower zones, formed by the tops and bottoms of capital letters and other letters such as b, d and g; and the middle zone, containing the remaining small letters. The relative forms and sizes of the zones are said to reveal people’s true selves.

For example, a large upper zone indicates someone who is outgoing and cheerful; a small lower zone suggests someone shallow and emotionally stunted; and an average-sized middle zone may point to someone who is well-organized and practical.

 

Picture Credit : Google

How handwriting experts catch criminals?

On the afternoon of July 4, 1956, Mrs. Beatrice Weinberger brought her month-old baby, Peter, back from an outing near their home in Westbury, Long Island, USA. She left the pram on the patio of her house and hurried inside to get the baby a clean nappy. When she returned a few moments later, the pram was empty – and a scrawled note was lying where Peter had been.

The note said: ‘Attention. I’m sorry this had to happen, but I’m in bad need of money, and couldn’t get it any other way. Don’t tell anyone or go to the police about this because I am watching you closely. I’m scared stiff, and will kill the baby at your first wrong move.

‘Just put $2000 (two thousand) in small bills in brown envelope, and place it next to the signpost at the corner of Albemarle Rd. and Park Ave. at exactly 10 o’clock tomorrow (Thursday) morning.

‘If everything goes smooth, I will bring the baby back and leave him on the same corner “Safe and Happy” at exactly 12 noon. No excuse, I can’t wait! Your baby-sitter.’

Despite the kidnapper’s warning. Mr. and Mrs. Weinberger, frantic with worry, contacted the police.

A dummy parcel containing cut-up pieces of newspaper was placed on the corner the following morning. But the kidnapper did not show up. He failed to keep two other ‘appointments’ with the Weinberger, and left a second note signed ‘Your baby-sitter’. By then, police felt that the baby was no longer alive.

The FBI was called in and the Bureau’s handwriting experts set to work to try to track down the kidnapper. In both the ransom notes an unusual z-shaped stroke was placed at the front of the y in words such as ‘money’ and ‘baby’.

Starting with New York State Motor Vehicle Bureau, the analysts spent the next six weeks combing through local records and at probation offices, work places, factories, aircraft plants, clubs and schools.

Altogether, more than 2 million signatures and handwriting samples were examined by eye and compared to the writing on the ransom notes.

Then, in the middle of August, the experts’ painstaking efforts paid off. The handwriting of Angelo John La Marca, of Plainview, Long Island, matched that of the kidnapper’s – especially in the peculiar formation of the y’s.

Some time previously La Marca had been put on probation for making illegal alcohol. On being shown the handwriting samples, he broke down and confessed to the kidnapping of baby Peter.

It had been a super-of-the-moment crime, he stated, committed to ease his financial problems. He told the police he had left Peter alive and well in a nearby park on the day after the kidnapping. But when officers hurried to the spot, all they found was the infant’s dead body. La Marca was later executed in New York’s Sing Sing Prison.

Even if La Marca had tried to disguise his handwriting he probably would still have been caught.

No matter how hard someone may try to disguise handwriting quirks and characteristics – or adopt those of somebody else – the ‘individuality’ of the writer shows through. The very angle at which he or she holds a pen; the way a t is crossed and an I is dotted; the height and size of capital and small letters; the amount of space between words; the use (or misuse) of punctuation marks. All these can identify a person as surely as fingerprints.

In 1983 Gary Herbertson, the head of the FBI laboratory’s document department, stated: ‘Any time you try to change your handwriting; you do things that look unnatural. A forger’s writing doesn’t have the speed, fluidity, the smoothness of natural writing.

‘You can see blunt beginnings and ends of strokes, rough curves, inappropriate breaks, little tremors. Two letters may be the same shape, but you can tell if one’s written quickly and the other is carefully drawn.’

In addition to their knowledge, handwriting experts use sophisticated instruments and machines in their work. These include infrared and ultraviolet scanning devices with which they look beneath erasures and changes; spilt-screen equipment for comparing dubious documents with genuine ones; and tools for greatly magnifying handwriting and comparing different ways of joining up letters.

The most notorious handwriting case in recent times involved the forgiving in the early 1980s of the ‘diaries’ of Adolf Hitler – committed his innermost thoughts in an antiquated German script. They included an entry on the Russian attack on Berlin in April 1945, when – in his bunker hide-out – Hitler allegedly wrote: ‘The long-awaited offensive has begun. May the Lord God stand by us.’

The 60 diaries were bought by the German weekly news magazine Stern for a reputed 6 million marks. Stern then sold subsidiary rights in France, Spain, Belgium, Holland, Italy, Norway and England – where extracts were published in the Sunday Times.

Publication in Germany began in the spring of 1983. And two of the diaries – from 1932, the year before Hitler became dictator, and 1945, the year of his suicide – were sent to the American magazine Newsweek, which was also interested in publishing them.

The magazine called in a leading handwriting expert, Kenneth Rendell, of Boston, Mass – who was immediately suspicious. ‘Even at first glance,’ he stated, ‘everything looked wrong.’

Using a powerful microscope and samples of Hitler’s genuine handwriting, he compared the two sets of writing – particularly the capital letters E, H and K – and found major discrepancies and dissimilarities between the two. These convinced Rendell that the diaries were fakes. In addition, the ink proved to be modern; and Hitler, when he had made notes and records in the early 1930s, had used only the finest quality, gold-embossed paper. He would not have resorted to the sort of cheap, lined notepaper on which the fake diaries were written.

As a result of the expose, a German criminal with a string of convictions – Konrad Paul Kujau – was later arrested along with two accomplices and tried for forging the diaries. In July 1985 he was found guilty by a Hamburg court and sentenced to four and a half years imprisonment. Once again, the handwriting expert had exposed the handwriting cheat.

 

Picture Credit : Google

How do police create an Identikit of a wanted man?

In February 1959 an armed robber held up a liquor store in southern California and made off which the takings, it was a typical small-time crime, but for one thing: the store owner gave Sheriff Peter Pitches of Los Angeles County Police a detailed description of the robber. This enabled the police to create a lifelike portrait of the wanted man.

Pictures of the robber were circulated in the area and, as a result of them, he was identified and arrested. He confessed to the crime and was duly punished – so becoming the first criminal in the world to be caught by means of Identikit.

The system had been conceived in the mid-1940s principally by Hugh C. McDonald, a detective with the Los Angeles Identification Bureau. Taking some 50,000 photographs of people’s faces, he cut them into some 12 main sections – and used them as the basis of what he called Identikit.

This consisted of almost 400 different and contrasting pairs of eyes, lips, noses, chins, hairlines, eyebrows, beards, moustaches  and so on. To build up a likeness, the various features were drawn on transparent plastic sheets, which were changed and overlaid until a composite portrait was created that matched eyewitness descriptions of the wanted person.

The use of photographs or artists’ impressions to identify and apprehend criminals dates back to the 1880s in France. Then a French criminologist named Alphonse Bertillon introduced a system which he called portrait parle, or ‘speaking portrait’. It involved the use of front and side photographs of captured criminals, cut into sections and mounted so that particular features – a hooked nose, a pointed chin, protruding ears and so forth – could be studied.

In the mid-1970s a second and now more commonly used Identikit system was introduced in North America. It was developed by Pat Dunleavy, an officer in the Royal Canadian Mounted Police, and it uses plastic sheets which contain actual photographs of facial features.

In the United Kingdom a system called Photo-FIT (Facial Identification Technique) has been used by the police since 1970. It is also used in Australia where it is commonly known as the Penry system. Photo-FIT also uses real photographs of ‘ordinary’ people mounted on thin plastic sheets. The basic five-section kit consists of 195 hairlines, 99 eyes and eyebrows, 89 noses, 105 mouths, and 74 chins and cheeks, which enable billions of possible combinations to be assembled. Features such as facial hair and spectacles are available as overlays. The pieces are cut so that the length and width the composite face can be fitted into a frame which holds them in place.

The basic kit relates to Caucasian (white) faces and there are supplementary kits to give North American Indian, Indian subcontinent and Afro-Caribbean features. A kit has not yet been developed for Oriental faces, which are usually drawn by artists.

Witnesses of crimes are interviewed by the police as soon after the events as possible – most people’s ability to recall starts to diminish after about a week.

For both Photo-FIT and Identikit, detectives begin by asking witnesses to recall details of the crime itself. They then move on to general descriptions of the suspect or suspects. For instance, were they short and burly, or lean and tall? What sort of clothes were they wearing? And what did the suspects actually do at the scene of the crime? Only then are the witnesses asked about facial details.

They leaf through books, or ‘feature atlases’ containing the various Photo-FIT or Identikit sheets, from which they make their selections. Faces are put together sheet by sheet, or strip by strip.

Often, a police artist is then called in to heighten the picture. A clear plastic sheet is laid over it and fine details such as hair shade, skin blemishes, scars or shaped eyebrows are added. The picture is then covered with an artist’s fixative spray and is signed by the witness.

Recently, computer technology has been introduced to enhance the pictures. This enables extremely lifelike faces to be drawn n computer screens according to eyewitness, descriptions, and fine alterations can be made to the image. From this, a photograph-like print can be obtained.

In addition, police mugshots (photographs of arrested criminals) can be stored on computer. They are coded according to physical characteristics and the computer can choose a selection which most closely matches witness descriptions.

 

Picture Credit : Google

What is Genetic fingerprinting?

Genetic fingerprinting has changed the course of crime detection. It is the most accurate method yet developed of identifying individuals. The probability against any two genetic fingerprints being the same by pure chance is greater than the number of people on Earth. The technique can also prove paternity of children and is being used to control the breeding of rare animals.

Professor Alec Jeffreys, a British geneticist at Leicester University, discovered genetic fingerprinting in 1984. He was conducting research into DNA – the chemical substance in the nucleus of every living cell which determines a person’s individual characteristics, such as the colour of hair and eyes. The structure of DNA is different in everybody, with the exception of identical twins.

Professor Jeffreys discovered that within the DNA molecule there is a sequence of genetic information which is repeated many times along the structure of the DNA, which looks like an endless twisting ladder.

The length of the sequence, the number of times it is repeated and its precise location within the DNA chain are unique to each individual. A process was developed to translate these sequences into a visual record. The finished picture, the genetic fingerprint, is a series of bars on an X-ray film, rather like the bar codes printed on food packets.

To obtain a DNA specimen, a scientist only needs a biological sample containing some human cells. This is usually blood, semen or hair, and only very small amounts are necessary.

Genetic fingerprinting is an important in establishing innocence as guilt. For example, a burglar who breaks a window may leave a blood sample behind on the glass. This can be used to create a genetic fingerprint. When police arrest a suspect, a blood sample can be taken from him and compared. If it matches, he is the burglar. If it does not, he is innocent.

When the police have a genetic fingerprint, but no suspect, they can fingerprint groups of people by taking samples of their blood. The first mass genetic fingerprinting happened in Leicestershire in 1987 when samples were taken from 5500 men living around a village where two young girls had been raped and murdered.

The killer was eventually found when a man was heard to say that a workmate had asked him to take his place when the samples were being taken. Another man who had previously been accused of one of the murders was freed because his genetic fingerprint did not match those made from the scene-of-crime evidence.

Genetic fingerprinting can also determine who is the father of a child and resolve paternity disputes. A DNA strand is made up equally of the characteristics of each parent. By comparing the genetic fingerprints of mother and child, a scientist can say with certainty that the parts of the child’s fingerprint which do not match those of the mother must have come from its true father.

Another use is in bone-marrow transplants which are given to people suffering from leukaemia. Doctors can check whether the genetic fingerprint extracted from a patient after a transplant matches that of the donor. If it does, the transplant has been successful and is producing healthy white blood cells. If it does not, the transplant has failed to take. This allows the possibility of another transplant.

Zoologists can use genetic fingerprinting to control the breeding of rare animals and preserve species. They can compare genetic fingerprints taken from animals to ensure that inbreeding among endangered species, which is known to lead to weaker animals, is avoided.

 

Picture Credit : Google

What is the Astounding case of four brothers?

Fingerprint evidence led to probably the only case in which two brothers, jointly convicted of murder, were executed by two other brothers.

In 1905, Alfred and Albert Stratton were accused of murdering an elderly couple who were battered to death above their shop in London.

Lying on the floor next to the bodies was an emptied cashbox in which the couple had kept their takings. On the box’s metal tray, fingerprint officers found the impression of a sweaty or oily thumbprint which did not match those of the dead couple – or that of the first police officer at the scene.

Suspicion fell upon the Strattons, both known housebreakers. They were arrested and tried at the Old Bailey. The thumbprint was the main piece of evidence.

Bothe men were found guilty and sentenced to death. They were hanged together by the brothers John William Billington, the public executioners, on May 23, 1905.

‘Mr Fingerprints’

The comparison of fingerprints for catching criminals was first developed in the 1890s by Edward Henry, the British inspector-general of the Indian police in Bengal.

Previously, the usual method of registering the characteristics of criminals was the anthropometric system, developed by Alphonse Bertillon, a French criminologist. It involved measuring the criminal’s arms and legs, and taking photographs from the front and sides.

Edward Henry became interested in fingerprints which had previously been used to study racial characteristics and evolution. He instructed his police officers to take impressions of criminals’ left thumbs in the belief that as most people were right-handed the ridges on the left thumb would be less worn. He then went on to devise a system based on the patterns of prints which was adopted in India.

His revolutionary ideas attracted interest in England, and in 1901 he was put in charge of the Criminal Investigation Department at Scotland Yard. He set up the first Fingerprint Branch which made more than 100 successful identifications within six months.

Henry later became Commissioner of the Metropolitan Police. He retired and was made a baronet in 1918, but was always known as ‘Mr Fingerprints’.

 

Picture Credit : Google

How to match up fingerprints to track down criminals?

The matching of fingerprints requires good eyesight and intense concentration.

The process is similar to one of those puzzles where you have to spot the differences between two apparently identical pictures. With fingerprint identification, the reverse applies – the fingerprint expert has to look for the similarities.

Fingerprints are normally stored by name on card-index systems at a control fingerprint bureau. In most countries, only the prints of convicted criminals together with unidentified marks in unsolved cases are kept.

Some countries keep a national archive of fingerprints but because of the time it can take to search, it is usually considered as only a back-up, for use if a mark is not matched locally.

Files of criminals with known specialties, such as car thieves or handbag snatchers, are also kept. Secret police forces and intelligence organizations also keep their own files of people they consider to be revolutionaries or enemy agents.

A fingerprint officer will begin by examining the marks taken from the scene and memorising their characteristics. He will then compare them against prints taken from innocent people who might have left marks at the scene – members of the family or policemen, for example. Any marks that match the innocent prints are rejected. The fingerprint officer then takes from the file all prints of possible suspects, whose names have been supplied by the investigating detective.

If these do not match, the officer has to make a wider and more painstaking search. If he is searching for a burglar, he will begin looking through all burglary cases in the locality and then all those from the adjoining town or area.

Depending on how much time was ordered to be spent on the search, he might pursue it through neighboring fingerprint bureaus in other police forces. The search for a house burglar can be widened to other potential types of criminals, such as safe-crackers, but the officer might not feel it worthwhile to extend the search to criminals who only pass bogus cheques.

Fingerprint officers also check the fingerprints of newly arrested criminals against unidentified marks from other crimes in the hope of clearing up unsolved cases. They will also compare unidentified marks against new marks to see if a series of crimes can be established. Officers can make dozens of comparisons a day, but many work for days without ever having a positive identification.

Most of this work is manual and can be very laborious. In the early 1980s electronic systems were developed to speed up the work. Prints and marks can now be stored and retrieved on electronic indexing systems, so that the press of a button calls up all the prints of, say, known car thieves living in a certain area and aged under 30. Systems can now be linked up between neighbouring forces, or with national collections, to widen the potential search. However, the actual comparison still has to be carried out by the fingerprint officer.

Scientists around the world are developing computer systems which store, retrieve and, most importantly, match prints and marks. Some matching methods, which can make 60,000 comparisons a second, are already being used by local police forces. But a fully automated, national fingerprint system is still in the future.

 

Picture Credit : Google

How to use glove prints to track down criminals?

Gloves yield distinct prints in much the same way as human flesh because of the grease which accumulates on the surface. Glove prints can also be revealed by a layer of powder and if they can be matched with a glove found in the possession of a suspect, it becomes powerful evidence.

The prints can distinguish the type of leather or fabric, its age, and the type of stitching used.

The first case of its type in the world was in 1971 at the Inner London Quarter Sessions. Police had obtained a print from a left-hand glove a burglar was believed to have worn while breaking a window. The print matched that of a pair of sheepskin leather gloves found in the possession of the suspect. He pleaded guilty.

 

Picture Credit : Google

How to use plastic and paint fingerprints to track down criminals?

The traces, actually called fingermarks, consist of tiny amounts of moisture which form patterns corresponding to the ridges and lines on the fingers and other parts of the hand. Non-absorbent materials such as plastics and painted surfaces produce better marks than absorbent ones like fabrics. Marks are normally invisible unless they have been left by paint or blood. So a police fingerprint expert coats likely surfaces with very fine dust, often powered aluminium. The particles stick to the moisture traces, making them visible. Sticky tape is then places on the mark to lift away an impression of the pattern, which can be taken away and photographed. Some fingermarks are now photographed on site.

Modern technology is now helping the police to obtain marks from some previously bags and smooth leather.

One method called vacuum metallization involves putting the surface into a container from which the air is expelled, creating a vacuum. A layer of gold, then a layer of zinc, is evaporated onto the surface. The gold is deposited uniformly over the area, but it is absorbed by the ridges of moisture which make up the fingermark pattern. Zinc will only condense onto another metal, so it adheres to the gold-coated areas, enhancing them to provide a contrast with the uncoated fingermarks. The pattern of marks is then photographed.

Once the photograph is obtained, it is compared with fingerprints of known criminals held on police files. There are four main types of fingerprint pattern. The patterns are divided up into such features as ‘forks’, ‘lakes’, ‘spurs’ and ‘islands’.

For an identification to be presented in court, a number of recognizable features of the mark of a single finger or thumb must correspond with the same number of features on the print. The number varies between countries, but can be as high as 17. If the mark shows more than one finger the court will usually accept fewer features per finger. Most fingerprint officers and detectives regard more than eight features as enough to confirm identity. Although this would not be presented in court, it would be enough to concentrate investigation on a suspect.

 

Picture Credit : Google

How to use fingerprints to track down criminals?

Gloves yield distinct prints in much the same way as human flesh because of the grease which accumulates on the surface. Glove prints can also be revealed by a layer of powder and if they can be matched with a glove found in the possession of a suspect, it becomes powerful evidence.

The prints can distinguish the type of leather or fabric, its age, and the type of stitching used.

The first case of its type in the world was in 1971 at the Inner London Quarter Sessions. Police had obtained a print from a left-hand glove a burglar was believed to have worn while breaking a window. The print matched that of a pair of sheepskin leather gloves found in the possession of the suspect. He pleaded guilty.

 

Picture Credit : Google

How paintings are X-rayed?

An X-ray – as used on the Millet picture – is the most common method of uncovering hidden paintings. Long wavelength X-rays are used because they are easily absorbed by paint. The degree of absorption depends on the type of paint. For instance, lead and cadmium-based paints are more absorbent than those containing chromium or cobalt. Thicker layers of paint will absorb more than thinner ones.

Photographic film is placed behind a suspect painting, and X-rays are passed through it from the front. When the film is developed, the ghostly outlines of earlier pictures may be seen.

In the early 1980s, for instance, two art restorers in Glasgow – both of them superintendents radiographers in a local hospital – X-rayed Rembrandt’s Man in Armour. They discovered what appeared to be a white plume blowing in the wrong direction from the top of the helmet. However, on turning the X-ray picture around, the ‘plume’ was seen to be part of an abandoned work by Rembrandt: a lady in a flowing white dress and headdress. Man in Armour is in the Glasgow Art Gallery and Museum.

Similarly, a painting by the 16th century Italian painter Paris Bordone – Saints Jerome and Antony Abbot commending a Donor – was found after X-ray to have two donors, one of them by an unknown artist. The painting is also in the Glasgow gallery.

X-rays are also used to study pentimento, the changes an artist makes while producing a painting. Alterations to the compositing, changes in the angle of an arm or a head, will all show up under X-ray, and are useful to art historians and restorers. (The word pentimento comes from the Italian word pentersi, ‘to repent’, suggesting a change of mind by the artist.)

Charcoal outlines

Infrared light is also used to discover paintings beneath paintings. When infrared light is shone on the picture it penetrates the surface paint and it reflected. The reflection is recorded on a camera. The effect is to make the thin, upper paint levels transparent, so revealing the charcoal outlines of the artist’s preliminary drawing. The technique has been used by New York’s Metropolitan Museum to study Flemish Renaissance paintings.

In some cases it reveals details not apparent on the final painting, and helps in understanding the artist’s technique.

 

Picture Credit : Google

What is the art of discovering old paintings under newer ones?

When Jean Francois Millet’s dramatic picture The Captivity of the Jews in Babylon was unveiled in the late 1840s it was vilified by public and critics alike.

The Paris critics thought the picture’s surface was too heavily encrusted with paint, and at least one of them complained about the undue savagery of the scene. ‘The soldiers are pressing the Jewish women… with more violence than is necessary,’ he wrote. ‘They behave as if they were attacking or sacking a city.’

The picture then vanished from sight and art experts assumed that Millet had destroyed it. In the winter of 1983, however, art restorers at the Museums of Fine Arts in Boston, Massachusetts, used X-ray radiography to reveal the presence of another picture under the surface of Millet’s portrait The Young Shepherdess.

The X-ray picture showed the image of Millet’s ‘long lost’ and controversial Captivity. It is now assumed that, far from destroying the picture, Millet reused the canvas more than 20 years later when art materials were in short supply during the Franco-Prussian War of 1870-1.

 

Picture Credit : Google

How to trace the cause of a fire disaster?

On New Year’s Eve, 1986, one of the most disastrous fires since the Second World War killed 97 people in a hotel in Puerto Rico. Workers at the hotel, the Dupont Plaza in San Juan, had become angry over the lack of a pay settlement, and two of them used methylated spirit to set fire to cardboard boxes and other rubbish in an empty ballroom.

Within 15 minutes the flames had engulfed the entire ground floor and trapped hotel guests on the top floor of the 21-storey building. Many of the 1400 occupants had to be rescued by helicopter. As well as the 97 dead, there were 140 people injured.

Investigators from the US Bureau of Alcohol, Tobacco and Firearms were on the scene while the fire was still raging. When they examined the charred remains of the furniture in the ballroom later, they discovered traces of the methylated, spirit and decided that the fire had been brought in to interview hotel staff.

Eventually, three employees were arrested – one charged with lighting the fire, one with assisting him, and the third with supplying the spirit. All three were convicted and given prison terms ranging from 75 to 99 years.

Fire investigators are among the first on the scene after a fire has been put out. Their first task is to preserve and record the remains. Sometimes it is clear that an arsonist has been at work: fires may have been started at several points, or someone might have been spotted running from the scene just before flames were noticed.

The next task is to locate the place or places where it was most intense. The spread of the fire must also be tracked. Much can be learned by looking at smoke patterns and damage to surfaces. Metals and glass can be useful guides. A metal rail will distort or melt according to its proximity to the hottest part of the fire. The density of cracks in glass usually corresponds to the intensity of heat.

Expansion of metals can also be revealing – a steel joist 33ft (10m) long and heated to 932  (500  will expand by 2 ¾ in (70mm). the depth of charring in wood or in layers of carpet also gives an indication of the heat or duration of a fire.

Against this must be balanced factors which help to spread fire. Lift shafts, air vents and stairwells give a chimney effect, raising hot gases to other parts of a building and creating secondary seats of fire. The investigator can be confused by localized fires caused by broken gas pipes or stored fuel. Exploding aerosol cans can create fireballs several feet across.

Having found the seat of the fire, the investigator will look for signs of the cause – empty petrol can leave by an arsonist, charred wiring that indicates a faulty electrical connection, even a fragment of carelessly discarded match.

Forensic scientists are skilled at examining fragments of burnt materials. After one of Italy’s worst fire disasters, the burning of the Statuto Cinema in Turin on February 12, 1983, in which 64 young people died, the projectionist was able to point to the site where the flames first appeared. Fire inspectors discovered the remains of old wiring which had started the blaze.

When remains of the wallpaper, carpeting and upholstery were sent for forensic examination in Rome, scientists found that contrary to Italian fire safety regulations none of these had been fireproofed. After a lengthy trail, the cinema owner, the supervisor of the redecoration work and two local fire officers, who had declared the cinema to be safe, were all sent to prison for between four and eight years.

If no cause of a fire is apparent the investigator might find that a dead body was a murder victim, suggesting the fire was started to cover up the crime. A human body is extremely difficult to burn away completely and the remains can tell investigators a great deal. There could be more intense burning of the body than its surroundings, suggesting that it had been set alight first, or evidence of asphyxiation in the remaining lung tissue, indicating that the person had been strangled.

The fire which killed 31 people at King’s Cross Underground Station in London in November 1987 was first believed by some to be arson. It began on an escalator and was fanned by the draught of air coming from the train tunnels below ground. Investigators finally concluded that it began in accumulated fluff and grease under the escalator, almost certainly ignited by a discarded match. Smoking had been banned on underground trains in July 1984, but many people lit cigarettes on the escalator as they were making their way out of the station.

 

Picture Credit : Google

How a lie detector prints out its verdict?

The lie detector is an assembly of three different instruments. Their outputs are fed separately to the lie detector and recorded as separate traces on a graph.

One instrument, the pneumogram, records breathing patterns. A rubber tube is strapped across the chest, and instruments measure fluctuations in the volume of air inside the tube, which are brought about by variations in breathing.

The second instrument, the cardiosphygnometer, detects variations in the blood pressure and pulse rate. The information is picked up by a bladder and cuff placed over the upper arm, in the way that doctors check blood pressure.

The third instrument is the galvanometer, which monitors the flow of a tiny electric current through the skin. The skin conducts electricity better when it is moist with perspiration. Electrodes are usually taped to the hand.

 

Picture Credit : Google

How to beat the lie detector?

Medical experts in the USA and Britain say that it is quite possible for a suspected person to beat the lie detector. The trick is to make the responses to the control questions appear as similar as possible to the responses to the real questions. For an answer to be classified as ‘deceptive’, it must register much more strongly than the control answers.

Dr David Thoreson Lykken, professor of psychology and psychiatry at the University of Minnesota Medical School, writes in his book A Tremor in the Blood that the interviewee could identify the control questions during the pre-test interview. He could then do something to increase his response to control questions during the test – something different each time so as not to arouse suspicion.

‘After the first control question, I might suspend breathing for a few seconds, then inhale deeply and sigh. While the second control is being asked, I might bite my tongue hard, breathing rapidly through my nose. During the third control question, I might press my right forearm against the arm of the chair or tighten the gluteus muscles on which I sit. A thumbtack in one’s sock can be used covertly to produce a good reaction on the polygraph.’

Dr Archibald Levey, of Britain’s Medical Research Council, who wrote a report on lie detectors for the British Government in 1988, says that meditation techniques can be used to achieve the opposite effect – by lowering the responses to all questions.

The interviewee could think himself into a relaxed state, concentrating on a different subject or imagining himself to be somewhere else.

 

Picture Credit : Google

How to detect lies with a machine?

In the early 1980s at least a million people every year in the USA were subjected to lie-detector tests – most of them applicants for jobs. However, the tests resulted in some people being falsely accused of dishonesty. One such victim was a college student, Shama Holleman, who was dismissed by a New York department store after a test indicated that she might be a drug dealer and might have served a prison sentence. Both were untrue.

Since then, US companies have been prohibited from using lie-detector tests to screen employees. However, government agencies and some security services and drugs firms are still allowed to use them.

Other major users of lie detectors are police forces, who tests suspects and witnesses in criminal cases, through not in Australia where their use is illegal. More than 60 years after the invention of the lie detector its use remains controversial.

The lie detector works on the assumptions that people who tell a lie become stressed emotionally, and the stress speeds up their pulse and breathing rate, and makes them sweat. These effects can be detected by sensitive instruments.

The first person to use instruments to detect stress through bodily changes was an Italian criminologist, Cesare Lombroso, in the 1890s. He measured variations in pulse rate and blood pressure.

In 1921 the first modern lie detector using continuous monitoring was developed, in conjunction with the local police, by a medical student, John A. Larson, at the University of California, Berkeley.

Larson’s machine recorded simultaneously a person’s blood pressure, pulse rate and a rate of breathing. The results were recorded by three pens making ink traces on a continuous roll of paper. The machine, called a polygraph, was soon dubbed a lie detector.

Later the polygraph evolved into the modern instrument with the addition of a fourth measurement – that of the skin’s ability to conduct electricity, which varies according to the amount of perspiration.

Ideally, lie-detector tests are conducted under strictly controlled conditions. The person to be tested is wired to the machine and asked a series of innocent questions (called control questions), such as: ‘Is your name John Smith?’ (which it may or may not be). This is to elicit a response from the subject that will provide reference traces on the polygraph.

Then if the person lies, the polygraph should be able to detect the changes caused by the stress of lying, and record them.

One drawback is that some people are so nervous that they may appear to lie even though they are telling the truth.

Other people may be so much in control of their emotions that they will be able to lie without affecting their polygraph traces. But this is exceptional.

 

Picture redit : Google

What is the objective of truth drug?

The objective of a truth drug is to relax, a person’s mind so that he gives completely open and truthful responses to whatever he is asked – even if it means betraying his country.

Research into so-called truth drugs began in earnest during the Korean War in the early 1950s, following reports about ‘brainwashing’ interrogation methods carried out by the North Koreans and Chinese on prisoners of war. The US Air Force began a project to find a ‘truth serum’ so that American pilots could be given it and trained in how to resist brainwashing.

Experiments began with barbiturates, amphetamines, alcohol and heroin, but most of the drugs just helped the subjects to tell lies more skillfully.

Purge trials

Fear of mind-control techniques had been raised during Joseph Stalin’s notorious purge trails in the Soviet Union and the Eastern Bloc countries in the 1930s and 1940s. Defendants appeared in court in an apparently befuddled state, with glazed eyes, admitting to crimes that they could not possibly have committed.

Sodium pentothal, a barbiturate used by anaesthetists to relax hospital patients before surgery, is often described as a truth drug. Its use in this context is to help create a disoriented state in which the subject’s awareness of his surroundings can be manipulated.

The subject is given a strong dose of the drug which makes him unconscious. He is then injected with the stimulant Benzedrine to revive him, but only partially. With the subject in a state of semi-consciousness, a psychiatrist can use hypnotic techniques to change his perception of what is going on around him.

When this method was used on a suspected Soviet spy in West Germany in 1955, his mind was taken back to a stage where he believed he was talking to his wife at home, and he freely gave a detailed account of his undercover activities.

 

Picture Credit : Google

What are the Invisible inks for secret messages?

A special form of carbon paper is used as a modern form of invisible ink. A spy lays the carbon paper on another piece of paper and writes his message. His handwriting is transferred invisibly onto the paper underneath, and can only be revealed when treated with a chemical. So it is possible to send messages by post ‘written’ on the pages of, say, women’s magazines.

This method was used by the Czechoslovakian spy Erwin van Haarlem, who in 1989 was jailed for ten years for his espionage activities in Britain. Since 1975 he had sent some 200 secret messages to his spymasters in Prague – many of them in invisible ink. The information included facts about British firms working on American’s Star Wars defence system.

Most chemical invisible inks need a second liquid – known as the reagent – to make them visible. One of the most popular inks is copper sulphate diluted with water. When the paper is later immersed in a weak solution of sodium carbonate (washing soda) and water, or ammonia and water, the writing appears blue.

A particularly sensitive chemical ink used by German spies during the Second World War involved chemicals used in photography. The ink was a solution of lead nitrate and water. The reagent was a small amount of sodium sulphide in water. It produces a shiny black print.

It was a crystal of concentrated invisible ink chemical, concealed in a hollow key that led a Second World War German spy, Oswald Job, to the scaffold. The ingenious hiding place was discovered when job was searched, and it led to his confession and execution in 1944.

 

Picture Credit : Google

What is Bugging by eavesdropping?

In the modern era of bugging, no conversation in office or home is safe from eavesdroppers. The bugging is usually done by smuggling a small but sensitive microphone into the room.

One type of bug uses a low-powered radio transmitter attached to the microphone to send its signals to a receiver a few yards away. Another type has the microphone connected to a receiver by a cable.

Although a wired-in system requires careful concealment of the cable, it has the advantage of not broadcasting a radio signal, which is easy to detect. And most rooms or offices have so much cable already installed that the extra wire goes unnoticed. The microphone can be designed to resemble a household appliance, like a light bulb, television or telephone.

Provided a listening post can be found within a reasonable radius of up to a kilometre and a half, every word spoken in the target room will be relayed over the wire. An existing cable, such as a spare telephone line, is usually used to carry the voices.

One of the reasons why diplomatic buildings are so closely guarded when under construction is the fear that a foreign intelligence agency might try to incorporated cable conduits into the fabric of the building. This occurred in Moscow in 1987, where all the steel beams delivered to the site of the Us Embassy were discovered to be hollow.

If an eavesdropper cannot gain access to a room, he can put a bug called a stethoscope to one of the walls from the outside. It is a simple microphone pressed to the wall, and rigged to an amplifier. Alternatively, a hole can be drilled through the wall from the outside, ending as a tiny pinhole on the inside of the room. A microphone in a tube is placed in the hole and connected to a tape recorder outside. A variation is the ‘spike’ which penetrates only part of the wall, but nevertheless picks up all the sounds in a room.

Inserting a device into a target room can be difficult if the room’s occupants know they may be spied on. So the laser has been exploited to help the eavesdroppers. A laser beam is focused on the window of the room. When a conversation takes place inside the room the glass in the window vibrates to the voice waves, and the microscopic movements of the glass can be detected by measuring the tiny variations in the length of the fixed laser beam. This information can then be converted back electronically into an intelligible form.

The cavity microphone is probably the ideal cordless device, requiring neither batteries nor maintenance. It consists of a capsule, about 1in (25mm) wide, containing a sensitive aerial and a diaphragm (a thin disc). When a radio beam is directed at the room from outside, the capsule is transformed into a radio transmitter that picks up sounds in the room, allowing any conversation to be overhead.

One of these bugs was found in a model of the American Great Seal that had been presented to the US Ambassador by the Mayor of Moscow in 1952 and had hung over his desk for years.

 

Picture Credit : Google

The underground world of ‘moles’

In November 1979, the British Prime Minister Margaret Thatcher announced to the House of Commons that one of the most respected men in the British art world, Sir Anthony Blunt, Surveyor of the Queen’s Pictures, had been working as a spy for the Russians.

Blunt had become a Communist in the 1930s and had worked for the British Security Service (MI5) during the Second World War, passing secrets to Moscow. In 1951 he helped two other British spies, Guy Burgess and Donald Maclean, to flee to Russia when they came under suspicion.

Blunt was an example of the type of spy known as a ‘mole’ – agents who are prepared to wait for years, building up their cover, until they get access to vital information.

Unlike more conventional spies who are recruited by their own country to undertake a mission in another, the mole is often someone who, usually for ideological reasons, has chosen to work for an alien cause. Having taken that decision, he deliberately manoeuvres himself into a position where he can inflict the most harm. And all the while he plays the part of a patriot.

Some moles are recruited by intelligence specialists known as case officers. Others recruit themselves by volunteering their services.

Probably the most renowned case since the Second World War was that of the four British spies Blunt, Burgess, Maclean and Kim Philby. All decided, while still at Cambridge University in the 1930s, to work secretly for the Soviet Union.

They were initially recommended by ‘talent-spotters’ who passed each onto a Soviet case officer who taught them the rudiments of espionage, and told them to give up their memberships of radical political groups. They were to make themselves as attractive as possible to official organizations.

Each man deliberately cultivated people in positions of influence whom he believed might assist him to find a useful job. Eventually Burgess and Maclean joined the Foreign Office, Philby the Secret Intelligence Service (MI6), and Blunt the counter-espionage service, MI5.

Once they were in their target organizations, the four men progressed to the most sensitive levels of government, gaining access to the most damaging information.

Maclean, Burgers and Philby all fled to Moscow and eventually died there. Blunt made a full confession to the British Security Service and was not prosecuted. He died in 1983.

A mole who spied against his own country purely for the money was Heinz Felfe, a former officer in the German SS who rose to an eminent position in the West German Federal Intelligence Agency in the 1950s.

In 1951, while looking for a job, he agreed to work for the Soviet secret service (later the KGB), for a salary of 1500 marks a month. At the same time he joined the Federal Intelligence Agency. For the next decade he worked as a double agent, feeding ‘disinformation’ about the KGB to the Germans and in return sending the KGB highly damaging information about the German spy network behind the Iron Curtain.

Suspicious about him finally arose when he bought a house which was too expensive for a man or one salary. When he was arrested in 1961 it was discovered that his activities had lost the West Germans 94 contacts behind the Iron Curtain, including 46 active agents. In 1963 Felfe was sent to prison for 14 years.

Another turncoat spy – who operated in the USA from the late 1960s to the mid-1980s – was John Walker, a former naval officer. His Russian spymasters paid him $1000 a week to run a family espionage ring, consisting of his brother Arthur, a retired Navy lieutenant commander, and son Michael, a seaman abroad the aircraft carrier USS Nimitz. Their activities enabled the Soviets to decipher countless top-secret communications and receive more than 1500 secret documents.

A quite different type of mole is the ‘sleeper’ who enters a foreign country on false documentation and burrows deep into the fabric of his adopted society.

Peter and Helen Kroger, US citizens of Polish extraction, were just a couple. Outwardly he was an antiquarian bookseller who, with his wife, led a comfortable suburban life at Ruislip in west London in 1961. In reality, the Krogers operated an illicit KGB wireless link with Moscow until they were arrested.

When the Kroger house was searched, even the most innocent-looking household item was revealed to be part of the paraphernalia of espionage. An apparently ordinary tin of talcum powder contained compartments for storing microfilms and a microfilm reader like a tiny telescope.

Renate and Lothar Lutze were deep-cover East German moles operating in West Germany before being arrested.

Born in Brandenburg, East Germany, in 1940, Renate Ubelacker, as she then was, got a job as a secretary in the West German Ministry of Defence in Bonn. Her work involved handling top-secret documents – including those dealing with NATO plans. In September 1972 she married Lothar Lutze, then a spy for the Ministry for State Security in East Germany. She succeeded in getting him a clerical job in the Defence Ministry.

For the next four years the couple gave vital information to the Russian-controlled East Germans. They were unmasked and arrested in June 1976. After spending three years on remand, Renate Lutze received a six-year sentence for spying and her husband was jailed for 12 years. She was released from prison in September 1981.

The most effective moles are those who are the very last to fall under suspicion. Burgess had been educated at Eton; Maclean’s father had been a Cabinet minister; Philby had joined SIS from The Times, and at the time of his exposure Anthony Blunt had been appointed Surveyor of the Queen’s Pictures at Buckingham Palace and had been knighted.

Some moles can be given a period of training before going into the field. For their own security it is vital for the moles to learn about secret methods of communicating with their own side and ways of spotting whether they are being watched.

The CIA operates a large base disguised as a military establishment at Camp Peary, in Virginia, USA; the French maintain a remote school high in the Alpes Maritimes in south-eastern France; while the Russian KGB have training centres near Leningrad.

However, it is occasionally impossible for a mole to undergo training, and he may have to be taught basic techniques while actually operating.

Oleg Penkovsky, a Russian lieutenant colonel, volunteered his services as a spy to the British in 1960. When he made a rare visit to the West in a Soviet trade delegation the following year, he was shown how to use a miniature camera and briefed on cipher systems. Instead of slipping away from his group, he simple pretended to go to bed early at his London hotel. In fact the British and Americans had hired the entire floor of the hotel directly above his room, and installed all the equipment necessary for the training sessions. The arrangement worked perfectly, and by the time he was due to return to Moscow Penkovsky was a fully fledged agent.

But his spying career was short-lived. Penkovsky was arrested by the KGB the following year and sentenced to death.

 

Picture Credit : Google

How secrets are sent by codes and ciphers

On the eve of the Japanese attack on Pearl Harbor in December 1941, an apparently innocent weather forecast, ‘East wind rain, north wind cloudy, west wind clear’, alerted Japanese diplomats around the world that war was imminent.

The message is one of the simplest forms of code – a prearranged message which had a special meaning to those who received it.

Similar messages were broadcast by the BBC during the Second World War to the French Resistance. A sentence such as ‘Romeo embraces Juliet’ or ‘Benedictine is a sweet liqueur’ might convey prearranged information about the dropping of agents or supplies. The first line of a poem by the French writer Paul Verlaine (‘The long sobs of the violins of autumn’) told the Resistance that the D-Day landings were about to begin.

More complex codes replace words or whole phrases with other words or phrases. Alternatively, groups of unconnected letters may be used to create a whole dictionary of words and phrases. For example, the order ‘Provide supporting fire’ might be conveyed by the letters GYPHC. Long military reports can be transmitted in these five-letter groups – only intelligible to someone who can look them up in the correct codebook.

If a codebook falls into enemy hands, however, vital information can be intercepted without the sender’s knowledge. In the First World War the German naval codebook was recovered from the wreck of the light cruiser Magdeburg. Consequently many of the German High Seas Fleet’s most sensitive orders were read by the British. Even when the German Admiralty discovered its loss, it took weeks before it could supply every German ship with a new codebook.

The other major method of sending secret information is with ciphers. A cipher substitutes letters, numbers or symbols for the real letters of the alphabet. The Morse code is actually a cipher, conveying each letter by combinations of short and long signals which can be sent by radio bleeps, telegraph or signal lamps. The letter E, for example, is a single dot, while Q is dash, dash, dot, dash (- – . -).

Another common, and simple, form of cipher is worked out on a grid called a cipher box. The message ‘Enemy troops embark December first’ could be written in a grid of, say, six columns, alternately writing left to right and right to left.

The person who receives the message uses a similar grid to decipher it.

A weakness of the system is that the frequency of letters and combinations of letters remains the same as in normal language. E, for example, is the most commonly used letter in the English language, and Z is one of the least common. The combinations EE and OO occur frequently. Someone trying to break the cipher can assume the most-often occurring letter represents E, and so on.

So immensely complicated ciphers, involving numbers as well as letters, have been developed by mathematicians.

During the Second World War the German government used a cipher machine called Enigma. However often a particular letter was keyed, it would never repeat the same cipher letter. Each day a new basic setting was made, according to a schedule known only to the Germans.

A team of university mathematicians and linguists in Britain eventually unraveled Enigma’s ciphers in 1940. Their work played a major part in winning the war by giving Allied Headquarters an up-to-the-minute picture of the German plans in the North African campaign and the air war.

With the advent of computers, codes have become far more complicated and difficult to break. Complex programs use thousands of calculations, and without knowing the sequence of key commands, they could take thousands of years to decode.

 

Picture Credit : Google

What is Voice scrambler?

When a government official wants to make a confidential telephone call to, say, an embassy abroad he uses a voice scrambler. As the conversation travels between the two telephones it is nothing but incomprehensible noise to anyone ‘trapping’ into the line.

Most scramblers are electronic ciphering machines that invert the high and low tones of a human voice to make it unintelligible. Other scramblers conceal the voice in a background of continuous noise.

At one time scramblers were issued only to senior military commanders who had to exchange sensitive information over telephone lines that might be listened into by the enemy. Now scramblers have become more easily available, and are often used by international businessmen anxious to protect trade secrets from unscrupulous competitors. Modern technology has reduced their size so they fit into a briefcase.

Double unit

Scrambling requires two units, the transmitter and the receiver. The transmitter converts the caller’s speech into the unintelligible form and sends it down a normal telephone line. The receiver reverses the process so that the voice can be understood at the other end. Eavesdroppers tapping into the line will hear a highly distorted, synthetic noise that is hardly recognizable as human speech.

Most scramblers work by splitting the sound of the voice into five frequency bands which are then mixed through a complicated electronic process which moves and inverts them. In theory there are about 3840 possible combinations, but standard scramblers use 512 permutations.

Voice scramblers are not a complete safeguard against skilled eavesdroppers, as conversations can eventually be unscrambled. But the process is extremely time-consuming, requiring the use of specially programmed data processors and highly trained operators, so scramblers do give short-term protection.

In the early 1960s, the US Embassy in Moscow managed to pick up the scrambled conversations passing between the Politburo’s fleet of limousines. Although there was a long delay before the signals could be unscrambled, the exchanges contained some extremely useful political information – and quite a bit of Kremlin gossip. The operation eventually ended when new security measures were introduced.

 

Picture Credit : Google

Camouflage: how do you hide a warship?

During the American War of Independence in the late 18th century some British units took to wearing buckskins in place of their traditional red coats. The men found that red made a good target for the American riflemen, whereas the dun-coloured buckskin was not so readily visible.

The use of such camouflage was taken further during the Afghan War in 1880. A colour known as khaki (the Urdu word for ‘dust’) was generally adopted to make the soldiers’ movements less obvious to the natives. Veterans who had served in India – and who had stained their white helmets brown with tea – knew that lack of visibility was the key to their survival in wartime.

During the Boer War of 1899-1902, however, British troops were still wearing bright scarlet uniforms. They had been traditional since the English Civil War, 250 years earlier, when Parliamentarian soldiers were provided with red coats simply because a large amount of red cloth was made the British soldiers easy targets for the Boer riflemen.

When the First World War broke out in 1914, dull colours such as khaki and grey had become the standard colour for uniforms, enabling soldiers from both sided to blend in with their combat surroundings.

Even so, the use of spotter planes left troops dangerously exposed on the ground. Camouflage netting and the ‘dazzle painting’ of weapons in zebra stripes was gradually introduced.

During some military manoeuvres on Salisbury Plain, the commander of a British army division – a survivor of the Boer War – told his men to attach pieces of foliage to their helmets, conceal their vehicles with drab netting and take advantage of the natural cover to hide themselves from aircraft.

The ruse was so successful that the division indistinguishable from the surrounding countryside. The idea of an entire unit losing itself in the landscape grew so attractive to the military command that camouflage gradually became accepted as an important weapon in the modern arsenal.

During the Second World War, camouflage was widely used as a technique of deception. As in the First World War, vulnerable installations such as fuel depots and munition stores were covered with netting so, from the air at least, they merged with the background. Decoys were deliberately displayed close by to draw enemy fire. Conspicuous area of water like the canals, used by bomber navigators as landmarks at night, were sprayed with coal dust to prevent them reflecting moonlight.

During the North African campaign of 1940-3 a dummy railway line was constructed to resemble a new supply spur to a tank assembly point. It even carried a fake train, complete with freight wagons and flat cars, and an impressive-looking locomotive with a disused camp stove billowing smoke from a cardboard funnel.

The hoax diverted attention away from the genuine rail head which was used to support General Auchinleck’s offensive against Tobruk in November 1941. His main forces and fuel dumps were so well hidden that the enemy never found them.

Camouflage has also been used to reduce the visibility of aircraft and ships.

When the underside of a bomber is painted light blue, it merges with the daytime sky, and when painted black, with the night sky. Some planes are painted on top so that – when seen from above – they merge with the ground below. Similarly, the familiar outline of a warship can be distorted by skillful paintwork designed to reduce the silhouette and even give the impression of a less threatening outline, perhaps that of an unarmed merchantman.

A false bow wave painted onto the hull of a warship can mislead a submarine captain about the speed of his target, and a false water line can confuse the range.

Camouflage techniques have been used to deceive air reconnaissance. During the Falklands campaign in 1982, British commanders were advised that the beleaguered Argentine forces could not be resupplied because Port Stanley’s only airfield was serviceable, having been damaged by the RAF’s bombs. Reconnaissance pictures showed what appeared to be a deep crater across the main runway.

In reality, heavily laden Argentine planes flew in every night, under cover of darkness, right up to the day before the surrender. It was only discovered much later that each morning a group of raw conscripts – equipped with nothing more than buckets, spades and wheelbarrows – left a circular pile of earth on the runway. When viewed from a height, their handiwork resembled a bomb crater.

 

Picture Credit : Google

How does stealth technology work?

In the late 1950s the American Central Intelligence Agency began sending Lockheed U-2 ‘spy-planes’ over the Soviet Union to take intelligence photographs. The U-2s flew at 80,000ft (24,000m) to be out of range of anti-aircraft fire, but it became clear that radar was not detecting them.

These extraordinary planes were little more than jet-powered gliders built of plastic and plywood. On takeoff they jettisoned their small outrigger wheels from the ends of their wings – and they landed on their main, retractable wheels in the centre.

It was not until May 1960, after more than four years of overflights, that the Russians shot one down using new radar equipment belonging to SA-2 surface-to-air missiles. And even then the U-2 did not receive a direct hit. A missile exploded close enough to put the fragile aircraft into an uncontrolled diver, and the pilot, Gary Powers, had to eject.

The success of the U-2s led to highly classified research work in the United States, known as ‘Stealth’, to create a military aircraft that was invisible to radar.

The U-2 had gone undetected for so long because it was made of non-metallic materials which absorbed radar waves rather than reflecting them back to the radar ground station as normally happens.

The Stealth programme aimed at designing high-performance military aircraft incorporating, among other features, a minimum of metal and with the exterior clad in highly absorbent tiles. The aircraft would be almost invisible to radar and could make most radar-controlled anti-aircraft systems obsolete.

Key targets

After being developed under a blanket of secrecy, the high-tech B-2 Stealth bomber was unveiled at the Northrop Company’s manufacturing plant in Palmdale, California, in November 1988.

An audience of invited guests and journalist was kept well away from the plane – which is designed to slip through enemy radar defences without being detected and then drop up to 16 nuclear bombs on key targets.

To help achieve radar invisibility, the bomber is coated with radar-absorbent paint on its leading edge.

A similar technology of radar invisibility is used underwater to foil sonar detection. Modern submarines are coated in a thick layer of a top-secret resin which is highly absorbent acoustically, and reflects only a minute amount of the energy transmitted by sonar detectors.

Ground clutter

Another technique used by aircraft to avoid radar is to fly at very low levels where there is a great deal of ‘ground clutter’ – radar reflections given off by buildings and other objects. Low-level aircraft can go undetected by most radar systems. But the latest, most sophisticated ground-defence systems are designed to discriminate between ground clutter and hostile planes. In addition, ground clutter is partly avoided by using ‘look-down’ radar systems, which track aircraft from other aircraft flying above.

 

Picture Credit : Google