Digital Fortress Book Review Final
Digital Fortress Book Review Final
Digital Fortress Book Review Final
I. PLOT SUMMARY
one in the headquarters of America’s National Security Agency (NSA) and another in
the form of a race against time across continents (America & Europe) for a gold ring. In
most military intelligence and war stories, the weaponry comprises machine guns, tanks
and explosives etc. But in Digital Fortress, the combat hardware is something that
almost all of us use in daily lives, such as computers, e-mail and the World Wide Web
AKA Internet. The protagonists primarily fight with brainpower, though there are some
instances where firepower, like guns, is also employed. The best thing about Digital
and code-breaking technologies such as brute force, algorithms, square coding, etc.
The book starts off with an emergency at United States’ NSA when it’s
1
director of the NSA, calls the agency’s head cryptographer, Susan Fletcher, a brilliant
mathematician to assist in finding a solution. What she uncovers sends shock waves
The NSA is being held hostage - not by a nuclear bomb - but by software
so complex that if released would cripple American intelligence. Thus begins the real or
rather the virtual war on cyberspace, where the “bomb” (an encryption algorithm) will
explode, exposing the entire American Defense Ministry’s data to anyone and everyone.
In the novel, “Digital Fortress” is actually the name given to a code created
by mathematics wizard, encryption software expert and former employee of NSA, Ensie
Tankado. A code with a potential to derail NSA’s efforts to keep tabs on all the data that
dollar code-breaking computer TRANSLTR. Born with deformed fingers due to the
effect of nuclear radiation his mother suffered at Hiroshima, Tankado grows up thirsting
for revenge against the United States. Later as he grows older, Tankado’s hatred for
America slowly fades. In his early age, Tankado becomes a cult figure among
programmers and is offered a job in Texas, US by IBM and rides a wave of fame and
fortune writing algorithms, forcing NSA to offer him a job in its team of cryptographers.
that through its TRANSLTR the agency could access and open everyone’s e-mail and
reseal it without their knowing. Tankado, a firm believer of the Latin saying “Quis
2
custodiet ipsos custodies” meaning “Who will guard the guards?”, tries to go public with
news about TRANSLTR and its capability with the help of Electronic Frontier
Foundation (EFF) – an online group of people championing for personal right to secrecy
Japan. To take revenge for his disgraceful exit from the NSA and US, Tankado creates
The virtual attack on the TANSLTR sparks off two chains of events – a
battle with a traitor within NSA headquarters that envelops Susan Fletcher, and a race
across continents for a gold ring worn by Tankado, on which is engraved the Latin key
to break the code and save vital defense data of the United States. The race draws in
David Becker, Fletcher’s fiancé, who travels to Spain to retrieve the gold ring. In Seville,
thrilling chase scenes, chilling murders and miraculous escapes result in Becker gaining
explosions, and it emerges that Strathmore, has an agenda that goes beyond decoding
Digital Fortress. The author’s skill at hinting and concealing Strathmore’s deceit will hold
3
II. EVALUATION
works, the origin of cryptography and nations security threat if the codes are not
decrypted on time. The whole plot revolves around NSA (National Security Agency),
whose primary function is to decode all the digital communications including personal
emails of common people; and to facilitate the decoding faster and effectively, they
The novel starts with interesting note, well plotted with vivid explanations
to the concept of cryptography and the attempt to decode the communication of people
for the security of the nation, involving a little suspense and thrill. But somewhere down
the story line, the end can be easily found out. Rather, that is the reason, after a certain
point of time it can be felt that the novel has lost the suspense and thrill.
The author has done exclusive study on the subject, which is clear from
the detailed working of NSA. However, one of the flaws of the book is that Brown
inaccurately portrays the leadership of the NSA; that is, as part of the Department of
Defense, the NSA director – by law – must be a three-star Lieutenant General or Vice
Admiral.
4
III. ADDITIONAL REQUIREMENT
and Electronic Security. Moreover, this novel also discusses the active counter-
sabotage when an “unbreakable” code Digital Fortress is about to open up the classified
Intelligence was used by the hero, David Becker, in retrieving the pass-
key of the code “Digital Fortress”. Though he is not an agent of NSA, CIA or FBI, he
utilized his innate skills and language capabilities which qualify him as one.
Likewise, the heroine, Susan Fletcher, also found out who was the actual
owner of the anonymous e-mail address by sending a tracer mail to that address. She
further discovered who the true traitor inside the NSA is.
3. Enumerate tradecraft application and point it out from what part of the
story?
following:
5
a. Observation & Description
In chapter 14 (p. 87), David Becker noticed that he skin on Tankado’s left
hand showed traces of sunburn, everywhere except a narrow band of flesh around the
smallest finger. Thus, he concluded that Tankando must have worn a ring and lost it
after he died. That ring was missing from the latter’s personal belongings. It is here
retrieve the lost gold ring. He posed as a member of staff of the Canadian Embassy
when he inquired at the Clínica de Salud Pública (p. 110, Chapter 20). He also told
Pierre Cloucharde that he is from the Canadian Consulate to gain trust from the old
reporter (p. 116, Chapter 22). Further, Becker used cover as a wealthy jeweler from
Burgos, Spain when he could not get information from Señor Roldán of Escortes Belén
(p. 148, Chapter 28). He then used the alias Miguel Buisán when he spoke with Alfonso
XIII concierge named Manuel in trying to find out where the German Hans Huber and
his escort Rocio Eva Granada are (p. 161, Chapter 30).
c. Surveillance
Susan Fletcher used internet surveillance to track down the real identity of
the owner of the e-mail add [email protected] (p. 91, Chapter 15). Susan had
6
the user’s phony address, and the remailing company, performing the duty for which it
Surveillance is also shown by the two NSA agents, Smith and Coliander,
when upon the orders of NSA Director Leland Fontaine, they keep an eye on the
assassin Hulohot as shown in the video they took when Tankando was killed (p. 481,
Chapter 117). Thus, another intelligence tradecraft was applied in here, which is
Clandestine Photography.
ring, David Becker used interview and elicitation techniques. He first used it on a young
lieutenant of the Seville Guardia (p.87, Chapter 14). In chase for the lost gold ring, he
again used these on the Canadian Pierre Cloucharde (p. 120, Chapter 22), Escortes
Belén’s Señor Roldán (p. 150, Chapter 28), on the escort Rocio Eva Granada (p. 184,
Chapter 35) and on the punk Two-Tone (p. 261, Chapter 58).