Comms, Hardware and Software Solutions for Technothriller Adventurers in March, 1991

Yes, stealing the computers would be more difficult than a number of other solutions. The general idea is that if bribery doesn’t work, they’ve got to look for someone else to bribe. Also, most people don’t like to think of themselves as traitors, but a little zapodlo (‘shady business’) is familiar to everyone in a planned economy, and taking a bribe for allowing a racketeer to confirm what someone trying to be hired as his bodyguard says about their military service might not sound like something which should fundamentally alter the self-image of records clerk.

It might mean taking a round-about way to the objective, working through actual Soviet criminals, but those are probably their best bets as ‘reliable’ contacts, anyway. Fortunately, a couple of the defected KGB officers whom the PCs’ paymasters also employ have contacts on the other side of the law. Some of those contacts, indeed, were informing on their fellow criminals, which means they might have a rather flexible view on loyalty, but should also mean that as long as they cannot get at their former handler to somehow betray all those who have knowledge of their complicated loyalties, there is formidable leverage at hand to ensure they do not turn against the PCs.

Theoretically, at least. Some criminals have been known to have low impulse control. That is one of those risks which must simply be accepted, in certain fields of work. Some find religion helpful. Or fatalism.

In the event that no amount of social engineering or bribery can turn up information which they can trust fast enough for their purposes, there are tech support people who can try to gain access.

One has years of experience with IBM System/360 programming, but only a few months to learn the Cyrillic alphabet and what the Soviets decided to call things in their version of the System/360 OS. Still, a few months are enough to learn quite a bit, and working with a crib sheet, I wouldn’t think it was impossible for them to perform the necessary searches. The fact that it would take him years to read all the results is irrelevant, a fluent Russian reader can read enough to confirm the results, watching him work.

Granted, the other options are even less ideal. Hana Khon reads Cyrillic fluently and is a genius with computers, but all of them much more advanced than IBM System/360 or the ES EVM ‘Ryad’ reverse-engineeed from them. She will have had a briefing on ES EVM computers and has been tasked with translating their many quirks into manuals designed to allow other people with technical knowledge to perform very specific searches on encountered ES EVM computers. At present, however, she has not yet encountered one of those computers herself and won’t until she begins her summer break in Geneva.

Amir Abelman (his hippie parents named him Faramir, but he refuses to introduce himself to strangers that way) was born in Yellow Springs, Ohio in 1964. He grew up a rabid fan of Star Trek and other science fiction, played with computers, went to MIT and graduated, despite wasting a lot of time doing things like attending conventions and publishing a fanzine. I don’t know whether he would ever have encountered an IBM System/360 or not, but even if he did, Mr. Abelman’s talents do not lie in the way of linguistics. He’s struggled mightily with Hebrew ever since making aliyah, despite a lot of help and organized teaching, not to mention intensive training during his IDF service (as a clerk in a finance department, where he understood the numbers, even if he struggled with the language) and if anyone tells him he has to study another new alphabet, he might possibly lose all hope.

Nika Tomić was not recruited for her tech support skills, but rather for her language skills. She speaks native Serbo-Croat, decent Russian, good German and good French. Well, she was recruited for her language skills and because of the company she kept. She had a degree in chemical engineering from the University of Belgrade and turned down a scholarship to Baumanka in Moscow, preferring instead to study at TU Berlin for a doctorate. As it turned out, she never finished her doctorate, but she did put her chemistry knowledge to good use.

When she went home to Yugoslavia one summer, she didn’t return to Berlin, but drifted instead, illegally, briefly through Italy, then over the Alps, into Austria and down again into West Germany. Where she set up shop making amphetamines which she supplied to criminal groups, gangs and motorcycle clubs in France and the Benelux countries. She was arrested in Belgium and Germany, on the basis of the testimony of criminals who’d been caught with her product, but denied everything and had nothing illegal on her. The German witness recanted his testimony in court, claimed he only repeated what the detectives wanted him to say, but the Belgium witness never turned up to court and she was acquitted.

In France, she was arrested with her boyfriend, Jules ‘Le Brigand’ Delhaize, a member of the Belgian motorcycle gang “Outlaws MC” (at that time not affiliated with the Chicago-based US club of the same name). While he claimed to own all the drugs and weapons in the motel room, the claim was unlikely to be believed in court, especially when the magistrate heard about the previous arrests. Both of them were likely to face a long time in prison and things got even worse when Nika was attacked while in jail waiting for trial, by two women, both bigger than her, armed with improvised shivs.

Nika sustained bad cuts to both arms defending herself and a stab wound in the back which punctured a lung, but when correctional officers broke up the fight, she had managed to put both of her opponents on the ground. Their injuries were not severe, more bruises, some damage to the wrist joint and a some pulled muscles, but the jail staff was all abuzz about such a tiny slip of a girl managing to defend herself at all, against two much stronger women, gang-affiliated and with multiple violent offenses. It was a couple of weeks later when a French official had a quiet word with the prosecutor to try only Delhaize, but defer a decision in the case of Nika Tomić.

As a result, Nika owes what she correctly guesses to be an intelligence or security service in France a favour. Well, actually, once she recovered from her wounds, they’ve been behaving as if they own her services in perpetuity, which does not please her at all, but her handler, Chrisic, has hinted to her that if she does well enough for the next few months, she might have enough knowledge DGSE does not want becoming public to continue her chosen career without having to jump at their every whim.

Nika is certainly no computer genius, but she has actually used an ES EVM computer, both at the University of Belgrade and at TU Berlin. She can barely program at all and takes a long while to do things on the thing, but she has used it for actual tasks, she reads Cyrillic and has the devious mind of a born criminal.

It might be that their best option will be the person they recruited mostly as an interpreter and to deflect surveillance. Of course, she will be trying to figure out some way to use it to escape her odious position of having to obey orders, if the PCs are forced to rely on her in any way.

I’m assuming that in order to find the right tapes, it would be necessary to input some kind of search command. If it comes to it that the character who has to do this happens to be either unfamiliar with IBM System/360 operating systems or unfamiliar with Cyrillic, in either case, aside from a couple of months of preparations before their trip into the USSR, they ought to get at least a skill check to do so according to the instructions on the meticulously prepared crib sheet they have along. Should something be differently set up than the crib sheet assumes, they might be all at sea, but a couple of months is enough to learn a whole new skill to IQ-level. It should be capable of getting rid of even a bad unfamiliarity penalty.

That depends on how they’re set up.

I mean one would hope so. But I was hearing about companies in the early 1990s that kept their backup tapes indexed in a paper book, because failure of that index would be catastrophic and they already understood solid physical security procedures, checklists and double checks, and so on.

What the Soviets and post-Soviets did, I have no idea.

1 Like

When I consider that the Soviets almost certainly never expected foreigners to enter military bases in search of personnel files and probably considered those the least important secrets any spy could be after, not to mention how many of their administrative staff were resistant to learning to use computers, there are almost certainly both printed paper archives and the storage tapes with personnel files are kept in alphabetic order by surname of the soldier.

On the other hand, they’re interested in more than a single file or two. They’re looking for twenty soldiers by name, in a database which includes 20,000+ names of soldiers who have served in the division which was stationed there for decades, before being dissolved into smaller units and mostly located elsewhere. And there might be several men with each surname, so they have to read the personnel file to confirm other details, like first name and patronymic or that the soldier served in a certain unit on a certain date.

In addition to which, they want to use the personnel files to identify other recruitment targets than those remembered by their defectors. Service in certain units over certain periods of time or having attended courses in special skills they are looking for could make someone a secondary recruitment target.

How heavy and bulky would personnel files for 20,000+ soldiers be?

Could they steal just the indexed tapes with all the personnel files and leave behind all other records in which they aren’t interested?

How many of those 9-track magnetic tapes are filled with 20,000 military service records and perrsonnel files? Vast majority of those were conscripts, who only served for two years, and would have limited information on their records, but the officers, praporshchiks and the very few long-serving contract soldiers, would have much longer files, with regular political assessments and the like.

GURPS has the answer! (Specifically GURPS High-Tech’s page on data storage densities.)

How big is a personnel file in terms of bytes?. At this date it’s not going to have huge bloated word processor documents or scanned pages embedded in it, just text. Let’s arbitrarily say an average of 50K.

So 20 records in a 4lb box of paper tape or cards, 60 records on a big 7lb magnetic tape reel. 30 records on a 3½" floppy disc.

I imagine that most conscripts just have very basic information. Basically their full names, date and place of birth, names of parents, address when drafted, medical assessment as fit to serve, unit assignment, dates and place of service, commanding officer and contact information as a reservist. Maybe a page or two, so 500-1000 words.

Special designation units or high security clearance would easily multiply that by five, but apply only to very few of them. Few conscripts were given very high clearances, it just wasn’t cost-effective to do a full background check and spend a year training someone in complicated careers, only for them to give you a year of work before their enlistment ended, with the first six monts probably featuring them still learning the ropes.

Officers, praporshchiks and contract soldiers would come to maybe about 20% of the total and take up most of the storage space. 5,000-10,000 words per personnel file, as they all had periodic GRU and KGB assessments of political reliability.

Ah.

So absolutely zero chance of just making off with all the magnetic storage tapes with 20,000+ service record personnel files and study them at leisure on an ES EVM mainframe in Switzerland. Even if 80% of them are conscripts with barely a couple of pages of text and only officers, longer serving personnel or those who had special training had long personnel files.

Sounds as if you’re talking about a maybe 5K average size, which I won’t argue with because honestly I have no idea. So multiply those storage capacities by 10.

If you have backups or offline data (remember harddrives were much smaller, and lots of storage was tape only, and only working stuff on disk) on tape, you have to be able to find the right tape. So reels were lableled, the reel covers are labeled, the storage containers are labled (racks for stuff that’s frequently used, boxes for stuff that’s rarely used) and all of it gets recorded. There may be an electronic index, but that’s a pain to use, the book is faster.

I think the way to do this is to hire an operator to do it. They’re underpaid, someone overing them a fistful of western currency is very tempting.

1 Like

Indeed, especially as “it’s only personnel records, Big Yuriy wants to look for guys with a very particular set of skills that he can recruit”.

As noted above, that’s plan A.

However, for the planners of the entire endeavour, there are many teams, they have access to various forms of support and logistics if they should need it, and there are multiple redundancies built into the overall plan. They don’t intend to get any of their recruiters killed and while they accept that there is a degree of risk inherent in travelling through politically unstable areas, snooping around military bases or asking questions about dangerous men in secret units, they are trying to mitigate those risks.

However, the kind of people who accepted the job offer in the first place are likely to be adventurous, confident and not afraid to take risks. There is always going to be some fraction of them who are Overconfident and those might be the kind of people who resort to personally sneaking onto the base along with a tech support person and an interpreter. It might be Plan Z, honestly, but that is no guarantee that it won’t happen. We will just have to have that they managed to screen out those who were Impulsive or On the Edge. Which they would do, unless, of course, in the opinion of their case officers, they had skill sets or connections which were to valuable to cut just because of a little enthusiasm…

Not all the case officers are as conscientious about avoiding situations where their recruiting agents might get killed in Eastern Europe or the USSR. As long as it doesn’t blow back on him or France, for example, former 11e Choc paratrooper and Service Action operative for the SDECE, Chrisic is relatively blasé about the possibility of those agents whom he trained not coming back, whether they are procurement agents or recruiting agents.

Back when he learned his trade, the murky world of intelligence and security was a pretty rough place, and he was one of the SDECE officers who lost their jobs when the agency was reformed into the DGSE, supposedly less political and more committed to working within the bounds of legality. But because the Cold War was still ongoing and the new and improved DGSE still needed to break laws on a consistent basis to perform its basic functions, Chrisic was able to remain a contractor for them while also making a good living as a criminal, applying his formidable skill set within Le mileu (common French term for the social scene of the underworld).

Chrisic is probably not going to enter the USSR, as while he speaks a smattering of several languages, Russian is not one of them. He might be of some assistance in Germany, however, as his SDECE assignments in the 1970s often had something to do with NATO and neutral country Stay-Behind Organizations (SBOs), like the Italian Gladio. Which means he has old intelligence and security contacts in several countries, among them Austria, Germany and Switzerland.

He certainly recruited people with mental oddities and personality disorders, as long as they had useful skills, having decided a long time ago that living in a wilderness of mirrors, always expecting betrayal, would make any sane person mad, so choosing mad people as your agents at least allowed you some choice in the type of madness. His superiors might not agree with his methodology, but he has also determined that telling headquarters no more than they truly need to know saves them worry and also reduces the odds that they’ll interfere with his job.

I have not yet seen a character sheet of a PC, but I would judge that there is a significant chance that one or more of them will be the kind of Curious, Impulsive, Overconfident or otherwise audacious and reckless type who ends up doing something very dangerous, when the more sensible move would have been to simply report that the mission was impractical as things stood and they would need a different approach. When a PC does that, at least they will have had some preparation and potentially have someone along who can use the ES EVM computers.

Thinking about it and while a Soviet military ES EVM computer system is indeed likely to be set up to print in Cyrillic, the development of the four series or ‘Ryad’ of the ES EVM was a joint COMECON project between the USSR and Bulgaria, Czechoslovakia, East Germany, Hungary and Poland. Even Cuba and Romania joined later. Even if we leave out Cuba and Romania (both Latin script), with whom cooperation was limited anyway, only the Soviets and the Bulgarians wrote in Cyrillic script. Czechoslovakia, East Germany, Hungary and Poland all used versions of the Latin alphabet.

How would the ES EVM, meant to be a unified system for all of these countries, deal with these different alphabets? I find it extremely unlikely that all information stored on computers in Czechoslovakia, East Germany, Hungary and Poland was stored in Russian or only written in Cyrillic. There must have been tape printers which could write Latin script, but were those peripherals which could work with the same basic computers or were there completely different versions of the computer?

The latter is less likely when we consider that the Bulgarians and Soviets made nearly all the computers (Bulgarians had been charged with developing software, but their computer industry was proportionally the most successful and they exported to all the other COMECON countries and even some countries outside of the traditional Soviet Bloc), with East Germany responsible for engineering and developing more storage capacity on magnetic tapes and making the tapes themselves.

Apparently, East Germans and Poles could and did buy their computers from the USSR or Bulgaria, but I doubt that this meant that they only stored data in Russian or Bulgarian. So, were the ES EVM computers designed in some way that allowed the installation of a language module?

Did the peripherals determine which language the printed data came in, but working on the computers required knowing Cyrillic? Or how would that have worked?

As with code pages, the machine will be set up for a particular character set when it’s installed. A character has to fit into 8 bits, so you can’t have all of them; the same bit sequence (0x95 in this example) might mean “þ” in a machine set up for Iceland, or “Х” in a machine set up for Russian-and-Bulgarian. If you want to combine characters from two locales, well, basically you can’t.

When I was learning Russian as a hobby in 1991, I was told that there were four different Russian-Cyrillic keyboard layouts in use and none of them showed any sign of going away any time soon.; I assume some of them did, though. I would hope there was only one Russian-Cyrillic keyboard layout for the ES EVM.

So the tape punch will still be spitting out 8-bit-per-row patterns, just as the discs and rapes are storing 8-bit bytes, but the meaning of those patterns will be defined by the locale, and nothing stores the locale along with the data because interoperability is for the distant future. (JGD said something about this earlier.) The keyboard will be a character-set-specific piece of hardware. A printer will probably get a different ROM for its built-in character set (or, for daisywheels, a different wheel). A monitor would be able to display anything, but the system can only feed it character shapes from one set at a time.

1 Like

Sounds heartbreaking for the poor tech support people. Hrafn Eirik will thus probably adapt relatively quickly to an East German ES EVM Ryad 4 (‘Series 4’) in German, given that he knows how to use an IBM System/360 and he reads and writes German. His struggle will be largely in adapting to the Cyrillic and Russian in the USSR machines, some of which were no doubt available in their now-no-longer-Communist-satellite-countries.

So, he spends a couple of months learning about the peculiarities of the ES EVM system from an East German instructor who studied in the USSR, and also, most urgently, how to read and write in Cyrillic and maybe understand a little spoken Russian. Layla is subjected to the same regime, though she is starting from relative ignorance about ES EVM computers, though she has accessed IBM mainframe computers through a terminal before, but never without assistance from Hrafn. Still, having her learn Russian and the terminology around use of the computers might be useful.

Hana Khon will not be a factor in the first adventure in Germany, but she might be in position in Geneva, to advise and figure out anything sent to her, when recruiters enter the USSR itself.

If one were setting up a computer science and networking research company in Geneva, how good a connection could you arrange to CERN without alarming anyone? Assuming that you chose the location with connectivity in mind and were prepared to spend as much as a million (GURPS) dollars or so to set up a special direct link to them and be able to access their awesome computing resources for some reasonable fee?

What kind of software can a neXTcube run?

Can it only run software written for neXTcube computers? If so, where did they stand, in relation to IBM PC compatibles with some kind of DOS and/or Windows and to Apple Macintosh?

In fields like image manipulation and forgery, with the aid of high quality printers and maybe even stolen passport blanks?

And things like writing reports and accounting for expenses, how did they stand in software for that?

Uploading maps and filling in which team are located where, location of nearby support teams, planning of routes to get them there, etc.?

Basically, which GURPS skills which might be used at headquarters do neXTcube workstations offer software tools for?

Yup.

It ran NeXTSTEP/OPENSTEP a(eventually NetBSD would be ported to it, in a limited way, but that’s much later). That is the Mach microkernel base which would eventually become MacOS 10+. It has BSD-like tools but fundamentally everything you want to run on it needs porting, which might be easy or might be impossible.

There is just no reason to use one unless you have very specialised computing needs. It’s a 25MHz 68040 at the core, which is also what’s in the middle of a Mac Quadra, and all the flashy graphical software has already been ported to, or indeed written for, that.

2 Likes

The NeXT step userland was pretty bog standard 4.4BSD, and most unix tools were available for them, including an X-server so they could be used as the display for stuff running somewhere else. The two places NeXT did sort of well in were scientific institutions and some finance shops, and the reason those places liked them was more or less the same – they had vastly superior development environments compared to anything else available. Also, they looked cool.

Someone who had never written code for a GUI could sit down at one, and have a working GUI application in 15 minutes. That’s not an exaggeration – my first sysadmin job was at my college math department, which had a NeXT lab, and I wrote a one page (double sided, but still ) guide on how to do that. The resulting program didn’t really do anything itself, but if you had, say, a numerical analysis program that already existed, it was trivial to wire it up so a user could click a few buttons, navigate a file selection dialog, maybe provide some options into number or text fields, and use that analysis without having to know much about how to interact with it directly, and the analysis program could get access to files on the network (for in and out), printing, and some other UI niceties.

you can do the same thing today on most platforms, but for the time (and a long time after), that wasn’t true. I did a fair bit of consulting work for a shop that was still using the stuff, well after NeXT took over Apple[1]. They had a huge library of stuff built around it, and a development staff that could pump out custom data visualzation tools for market analysts pretty much instantly.

[1] The history books say Apple bought NeXT. They’re wrong.

Where do I find several top-notch people in the field of computing and networking in Europe in 1990, enough to both convince other people in the field that a new company founded in Geneva is real and to actually set up an operation where information technology is used to support headquarters work and process data received from field people, including the possible decryption of encrypted data and the forensic accounting of financial records?

I’ll want at least one, maybe two, people in senior positions who have credibility as academics and/or as someone competent at taking theoretical research and technology in academic use and applying them to business. And some good financial analysts and forensic accountants, young enough to either use networked computers in their work already, or at least be willing to adopt new technologies.

One possible capability would be potentially tracing bank transfers and also automating as much of the work of friendly bankers in obscuring the source of funds by moving them between multiple accounts of different companies in a variety of banks in jurisdictions with strong bank privacy laws. The cover for this would be handling all secure networking and other information technology for an actual private bank in Geneva and seeking genuine contracts with other Swiss banks (I don’t expect success within merely a short time-frame, but there is enough value in this capability to keep the company going for many years).

There must be applications in forensic accounting and financial espionage, as well as countermeasures against both, especially as banks adopt technology which makes interbank transfers easier, but may not always understand the technological implications for security. First investigate whether there are electronic traces to follow. Starting from, maybe, an employee at one bank in Cyprus giving you information on secret KGB accounts there and transfers to a bank in Switzerland, see if analyzing traffic when you know these transfers went through gives you any indicators which could be used to spot banking traffic in future transactions, where you lack some of the details, like which bank receives the funds. And then work on eliminating any such telltale signs for secret transfers made by their client banks.

In addition to prestige hires of people coming from respected academic institutions or successful tech companies, I’d also need people who might be unknown, but would know everything the company does, including the (potentially illegal in many countries) espionage-adjacent acticities. Who needs to be aware of everything, not just the legitimate work in financial security (which involves analyzing vulnerabilities), but actual uses of technology developed from that to launder money or trace transactions beyond the bounds of legality?

Probably a sysadmin, definitely the programmers who add extralegal tools to otherwise legal programs, whoever (where do we get them?) does actual technology-enabled financial espionage, money laundering or penetrating the computer security of banks, corporations or other institutions, and maybe some hardware-specialists who use their expertise to advise personnel doing illegal things useful to the employers of adventurers.

I will need to hire someone from CERN, ideally without them cutting ties with CERN, maybe for a part-time position. What were early centers of academic and business use of networked computers in Europe?

Which UK universities, big companies or other institutions?

What about in the Benelux countries, France and Germany? For France, ideally someone not locked in to Minitel and unwilling to change over to protocols used in the rest of the world.

Which universities in Switzerland itself, Austria and Italy were early adopters of computers, networking and, eventually, the Internet? What about Italian corporations in the field of computer technology?

If there is a security reason why US staff can’t be hired, where else can you find expertise with computers and networking at the end of 1990? There are no special connections with Japan, Taiwan or South Korea, but if consulting an expert at CERN or the top European universities in the field would recommend hiring from a company, institution or university there, they could look into it.

And they might have some connections to Hong Kong, people who’ve lived and worked there. Would there be anyone there at the forefront of the use of IT in banking and financial services?

Where would be the best locations and institutions to find skilled staff at the end of 1990, both those who’d only know about legal business and then the possibly less-senior people who’d be involved in communicating with people doing dubious stuff in Eastern Europe and the USSR, as well as trying to advance the state of the art technology in money-laundering and financial espionage?

In 1990, what kind of physical connection could you put up between an office building full of personal computers and terminals and another location replete with mainframes and supercomputers, about 500 to 900 meters away?

Modern users would use broadband fiber-optic connection. What could you get in 1990?

What would you use and what kind of connection speed would you get if your budget (for the connection alone, terminals and other stuff is separate) if your budget was $50,000 in 1990, about $125,000 in modern dollars?

What about if we double or quadruple the budget, is there a much better bang for buck method to connect an offsite location to all the powerful computers in other locations less than a kilometer away, in 1990? And what kind of connection speed could that yield?

Wired ethernet canonically goes to 100m (and 10baseT is just coming in). You could use repeaters. Probably the best option is 10baseF (optical fibre), which will go 1km and has come in in 1987. That gets you 10Mbit/s.

If the route needs to be longer, you’re basically looking at telephony: the DS0 circuit gives you 64kbit/s, and they get muxed together with TDM for higher bandwidth. (The European standard E1 is 30 of those channels and just about 2Mbit/s, for example.)

Can’t vouch for prices.

1 Like

Cool, I didn’t realize you had the option of optical cable so early.

That’s okay, I found some 1990 prices of optical cable, once I had the appropriate terms to use for searches.

So, I know optical cable is perfect for this use case, but not for all other potential uses I can imagine they need. Are there line-of-sight laser communicators with bandwidth significantly better than battlefield telephone wires available this early or is that much later?