You are on page 1of 53

Internet of Things Information

Processing in an Increasingly
Connected World Leon Strous
Visit to download the full and correct content document:
https://textbookfull.com/product/internet-of-things-information-processing-in-an-increa
singly-connected-world-leon-strous/
More products digital (pdf, epub, mobi) instant
download maybe you interests ...

Connected Environments for the Internet of Things


Challenges and Solutions 1st Edition Zaigham Mahmood
(Eds.)

https://textbookfull.com/product/connected-environments-for-the-
internet-of-things-challenges-and-solutions-1st-edition-zaigham-
mahmood-eds/

Internet Of Things Raj Kamal

https://textbookfull.com/product/internet-of-things-raj-kamal/

Blockchain Technology in Internet of Things Liehuang


Zhu

https://textbookfull.com/product/blockchain-technology-in-
internet-of-things-liehuang-zhu/

Performability in Internet of Things Fadi Al-Turjman


(Ed)

https://textbookfull.com/product/performability-in-internet-of-
things-fadi-al-turjman-ed/
The Internet of Things Mercedes Bunz

https://textbookfull.com/product/the-internet-of-things-mercedes-
bunz/

Industrial Internet of Things Sabina Jeschke

https://textbookfull.com/product/industrial-internet-of-things-
sabina-jeschke/

Sensor Projects with Raspberry Pi: Internet of Things


and Digital Image Processing 1st Edition Guillermo
Guillen

https://textbookfull.com/product/sensor-projects-with-raspberry-
pi-internet-of-things-and-digital-image-processing-1st-edition-
guillermo-guillen/

Programming the Internet of Things Andy King

https://textbookfull.com/product/programming-the-internet-of-
things-andy-king/

Signals in the Soil Developments in Internet of


Underground Things Abdul Salam

https://textbookfull.com/product/signals-in-the-soil-
developments-in-internet-of-underground-things-abdul-salam/
IFIP AICT 548
Leon Strous
Vinton G. Cerf
(Eds.)

Internet of Things
Information Processing
in an Increasingly Connected World

First IFIP International Cross-Domain Conference, IFIPIoT 2018


Held at the 24th IFIP World Computer Congress, WCC 2018
Poznan, Poland, September 18–19, 2018
Revised Selected Papers

WCC
2018
POZNA
IFIP Advances in Information
and Communication Technology 548

Editor-in-Chief

Kai Rannenberg, Goethe University Frankfurt, Germany

Editorial Board
TC 1 – Foundations of Computer Science
Jacques Sakarovitch, Télécom ParisTech, France
TC 2 – Software: Theory and Practice
Michael Goedicke, University of Duisburg-Essen, Germany
TC 3 – Education
Arthur Tatnall, Victoria University, Melbourne, Australia
TC 5 – Information Technology Applications
Erich J. Neuhold, University of Vienna, Austria
TC 6 – Communication Systems
Aiko Pras, University of Twente, Enschede, The Netherlands
TC 7 – System Modeling and Optimization
Fredi Tröltzsch, TU Berlin, Germany
TC 8 – Information Systems
Jan Pries-Heje, Roskilde University, Denmark
TC 9 – ICT and Society
David Kreps, University of Salford, Greater Manchester, UK
TC 10 – Computer Systems Technology
Ricardo Reis, Federal University of Rio Grande do Sul, Porto Alegre, Brazil
TC 11 – Security and Privacy Protection in Information Processing Systems
Steven Furnell, Plymouth University, UK
TC 12 – Artificial Intelligence
Ulrich Furbach, University of Koblenz-Landau, Germany
TC 13 – Human-Computer Interaction
Marco Winckler, University of Nice Sophia Antipolis, France
TC 14 – Entertainment Computing
Rainer Malaka, University of Bremen, Germany
IFIP – The International Federation for Information Processing
IFIP was founded in 1960 under the auspices of UNESCO, following the first World
Computer Congress held in Paris the previous year. A federation for societies working
in information processing, IFIP’s aim is two-fold: to support information processing in
the countries of its members and to encourage technology transfer to developing na-
tions. As its mission statement clearly states:

IFIP is the global non-profit federation of societies of ICT professionals that aims
at achieving a worldwide professional and socially responsible development and
application of information and communication technologies.

IFIP is a non-profit-making organization, run almost solely by 2500 volunteers. It


operates through a number of technical committees and working groups, which organize
events and publications. IFIP’s events range from large international open conferences
to working conferences and local seminars.
The flagship event is the IFIP World Computer Congress, at which both invited and
contributed papers are presented. Contributed papers are rigorously refereed and the
rejection rate is high.
As with the Congress, participation in the open conferences is open to all and papers
may be invited or submitted. Again, submitted papers are stringently refereed.
The working conferences are structured differently. They are usually run by a work-
ing group and attendance is generally smaller and occasionally by invitation only. Their
purpose is to create an atmosphere conducive to innovation and development. Referee-
ing is also rigorous and papers are subjected to extensive group discussion.
Publications arising from IFIP events vary. The papers presented at the IFIP World
Computer Congress and at open conferences are published as conference proceedings,
while the results of the working conferences are often published as collections of se-
lected and edited papers.
IFIP distinguishes three types of institutional membership: Country Representative
Members, Members at Large, and Associate Members. The type of organization that
can apply for membership is a wide variety and includes national or international so-
cieties of individual computer scientists/ICT professionals, associations or federations
of such societies, government institutions/government related organizations, national or
international research institutes or consortia, universities, academies of sciences, com-
panies, national or international associations or federations of companies.

More information about this series at http://www.springer.com/series/6102


Leon Strous Vinton G. Cerf (Eds.)

Internet of Things
Information Processing
in an Increasingly Connected World
First IFIP International Cross-Domain Conference, IFIPIoT 2018
Held at the 24th IFIP World Computer Congress, WCC 2018
Poznan, Poland, September 18–19, 2018
Revised Selected Papers
Editors
Leon Strous Vinton G. Cerf
De Nederlandsche Bank Google
Amsterdam, The Netherlands Reston, VA, USA

ISSN 1868-4238 ISSN 1868-422X (electronic)


IFIP Advances in Information and Communication Technology
ISBN 978-3-030-15650-3 ISBN 978-3-030-15651-0 (eBook)
https://doi.org/10.1007/978-3-030-15651-0

Library of Congress Control Number: 2019934341

© The Editor(s) (if applicable) and The Author(s) 2019. This book is an open access publication.
Open Access This book is licensed under the terms of the Creative Commons Attribution 4.0 International
License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution
and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and
the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this book are included in the book’s Creative Commons license,
unless indicated otherwise in a credit line to the material. If material is not included in the book’s Creative
Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use,
you will need to obtain permission directly from the copyright holder.
The use of general descriptive names, registered names, trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that such names are exempt from the relevant
protective laws and regulations and therefore free for general use.
The publisher, the authors and the editors are safe to assume that the advice and information in this book are
believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors
give a warranty, express or implied, with respect to the material contained herein or for any errors or
omissions that may have been made. The publisher remains neutral with regard to jurisdictional claims in
published maps and institutional affiliations.

This Springer imprint is published by the registered company Springer Nature Switzerland AG
The registered company address is: Gewerbestrasse 11, 6330 Cham, Switzerland
Preface

Like every new technology, the Internet of Things (IoT) offers opportunities for
progress and application for beneficial purposes while at the same time it introduces or
increases risks and threats. There are many aspects to be considered when talking about
IoT. Consequently the IFIP Domain Committee on IoT organized a working
conference with a broad scope. In principle, papers on all aspects related to IoT were
solicited. This book contains the revised versions of the papers presented at the first
IFIP Internet of Things (IoT) conference that took place in Poznan, Poland, during
September 18–19, 2018 as part of the IFIP World Computer Congress (WCC) 2018.
The IoT Program Committee consisted of 55 members who considered 24 sub-
missions for the first edition of this conference. Each paper was on average refereed by
three reviewers, using the single-blind review principle. In total, 13 papers were
selected for presentation resulting in an acceptance rate of 54%. One accepted paper is
not included in this book because it was not presented at the conference. The papers
were selected on the basis of originality, quality and relevance to the topic.
The papers range from a technology perspective to a business perspective. Topics
include hardware, software and management aspects, process innovation, privacy,
power consumption, architecture, applications and a few more. In addition to the
refereed papers we also have a paper from the invited speaker Kees van der Klauw who
challenged the audience by stating that the IoT is hardly about technology. Finally the
draft position paper by IFIP on the IoT is included. The paper investigates what choices
can or must be made regarding the various aspects of the IoT. This draft was discussed
in a panel session and the outcome of the discussion will be included in the final
version.
Looking at this wide range of topics makes us realize that we are just at the infancy
of the IoT and that a lot of further research and work are needed. We thank the authors,
the Program Committee and the participants for their hard work and contributions and
look forward to a continued involvement.
The IFIP World Computer Congress (WCC) 2018 had a number of plenary and
special sessions scheduled. We are very pleased to present in this book a few
contributions out of those sessions. WCC 2018 had four plenary keynote speakers: Wil
van der Aalst, Leslie Valiant, Jan Camenish and Shamika Sirimanne. While all four
keynote presentations were recorded on video (see www.wcc2018.org and www.ifip.
org) Wil van der Aalst also contributed a paper, addressing the question of responsible
data science in a dynamic world. A special day at WCC 2018 was the Enigma day with
a live demonstration of a message encryption and decryption. A paper in this book
describes the history of how three Poznan University students broke the German
Enigma Code and shortened World War Two. The third contribution in this book is a
summary of workshops on professionalism and frameworks, a “must be” core topic for
professional computer societies and associations. And finally, in an open debate, an
vi Preface

emerging question was discussed: Should Artificial Intelligence be more regulated?


While this session is also recorded on video, a summary is presented in this book.
We feel that all contributions make the book a rich volume in the IFIP AICT series
and we trust that the reader will be inspired by it.

February 2019 Leon Strous


Vinton G. Cerf
IFIP WCC 2018

Information Processing in an Increasingly Connected World:


Opportunities and Threats

IFIP WCC 2018 Steering Committee


General Congress Co-chairs
Roman Słowiński Poznan University of Technology, Poland
Leon Strous De Nederlandsche Bank, The Netherlands

General Program Co-chairs


Mike Hinchey Lero-The Irish Software Research Centre, Ireland
Jerzy Nawrocki Poznan University of Technology, Poland

Publication Chair
Basie von Solms University of Oxford, UK/University of Johannesburg,
South Africa

General Organizing Chairs


Robert Wrembel (Chair) Poznan University of Technology, Poland
Andrzej Jaszkiewicz Poznan University of Technology, Poland
(Co-chair)

Members
Joanna Józefowska Poznan University of Technology, Poland
A Min Tjoa Vienna University of Technology, Austria
IFIPIoT 2018

Internet of Things: Information Processing


in an Increasingly Connected World

IFIPIoT Program Committee


Co-chairs
Leon Strous* De Nederlandsche Bank, The Netherlands
Vinton Cerf Google, USA

Members (* are also member of the IFIP Domain Committee IoT)


Jose Abdelnour-Nocera University of West London, UK
Hamideh Afsarmanesh University of Amsterdam, The Netherlands
Carmelo Ardito* Università degli Studi di Bari Aldo Moro, Italy
Ioannis Askoxylakis FORTH-ICS, Greece
Soumya Banerjee Birla Institute of Technology, Mesra, India
Ezio Bartocci Vienna University of Technology, Austria
Juergen Becker Karlsruhe Institute of Technology, Germany
Samia Bouzefrane CEDRIC, Conservatoire National des Arts et Métier,
France
Luis Camarinho-Matos* Universidade NOVA de Lisboa, Portugal
Augusto Casaca* INESC, Portugal
Tibor Cinkler* Budapest University of Technology and Economics,
Hungary
Luc Claessen University of Hasselt, Belgium
Lucio Davide Spano University of Cagliari, Italy
Jose Neuman De Souza* Federal University of Ceara, Brazil
Ibrahim Elfadel Masdar Institute at Khalifa University of Science
and Technology, UAE
Gordon Fletcher* University of Salford, UK
Miria Grisot University of Oslo, Norway
Gerhard Hancke City University of Hong Kong, SAR China
Michael Huebner Brandenburg University of Technology Cottbus, Germany
Katrin Jonsson Umeå University, Sweden
Joaquim Jorge INESC, Portugal
Srinivas Katkoori University of South Florida, Tampa, USA
Bouabdellah Kechar University of Oran 1 Ahmed Ben Bella, Algeria
Arianit Kurti RISE Interactive, Research Institutes of Sweden, Sweden
Maryline Laurent Telecom SudParis, France
Antonio Mana University of Malaga, Spain
Tiziana Margaria University of Limerick, Ireland
x IFIPIoT 2018

Konstantinos Royal Holloway University of London, UK


Markantonakis
Peter Marwedel Technical University of Dortmund, Germany
Maristella Matera Politecnico di Milano, Italy
Christina Mörtberg* Linnaeus University, Sweden
Raja Naeem Akram ISG-SCC, Royal Holloway University of London, UK
Maciej Ogorzalek Jagiellonian University, Poland
Fabio Paterno* CNR-ISTI, Italy
Rasmus Pedersen Copenhagen Business School, Denmark
Simon Perrault Yale-NUS College, Singapore
Joachim Posegga University of Passau, Germany
Ricardo Rabelo Federal University of Santa Catarina, Brazil
Franz Rammig University of Paderborn, Germany
Kai Rannenberg Goethe University Frankfurt, Germany
Delphine Reinhardt Georg-August-Universität Göttingen, Germany
Ricardo Reis* Universidade Federal do Rio Grande do Sul, Brazil
Carmen Santoro CNR-ISTI, Italy
Damien Sauveron* University of Limoges, France
Weiming Shen National Research Center, Canada
Basie von Solms* University of Johannesburg, South Africa
Dimitrios Soudris National Technical University of Athens, Greece
Jean-Yves Tigli University of Côte d’Azur – UCA, France
Chi Tsui Hong Kong University of Science and Technology
Kowloon, SAR China
Fatih Ugurdag Ozyegin University Istanbul, Turkey
Eugenio Villar University of Cantabria, Spain
Janet Wesson Nelson Mandela University, South Africa
Marco Winckler* Université Nice Sophia Antipolis, France

Additional Reviewers
Boutheyna Belgacem University of Passau, Germany
Saifeddine Ben Haj Karlsruhe Institute of Technology, Germany
Khalifa
Akos Grosz Goethe University Frankfurt, Germany
Javier Hoffmann Ruhr-University Bochum, Germany
Osvaldo Navarro Ruhr-University Bochum, Germany
Johannes Pfau Karlsruhe Institute of Technology, Germany
Contents

WCC 2018 Plenary Contributions: Keynote, Special Sessions

Responsible Data Science in a Dynamic World: The Four Essential


Elements of Data Science. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Wil M. P. van der Aalst

How Three Poznan University Students Broke the German Enigma Code
and Shortened World War Two . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Roger G. Johnson

Professionalism and Frameworks. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21


Moira de Roche

Should Artificial Intelligence Be More Regulated? Panel Discussion . . . . . . . 28


Leon Strous

IFIPIoT 2018 Invited Papers: Keynote, Panel Discussion

The Internet of Things is Hardly About Technology . . . . . . . . . . . . . . . . . . 37


Kees van der Klauw

IoT: Do We Have a Choice? Draft IFIP Position Paper . . . . . . . . . . . . . . . . 50


Leon Strous and IFIP Domain Committee on IoT

IFIPIoT 2018 Refereed Papers

The Outcomes of the Implementation of Internet of Things:


A Public Value Perspective . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59
Ott Velsberg

Strategies for Reducing Power Consumption and Increasing


Reliability in IoT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Ricardo Reis

An Internet of Things (IoT) Model for Optimising Downtime Management:


A Smart Lighting Case Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Brenda Scholtz, Mando Kapeso, and Jean-Paul Van Belle

IoT Enabled Process Innovation: Exploring Sensor-Based Digital Service


Design Through an Information Requirements Framework . . . . . . . . . . . . . . 105
Niclas Carlén, August Forsman, Jesper Svensson, and Johan Sandberg
xii Contents

An Internet of Things Based Platform for Real-Time Management


of Energy Consumption in Water Resource Recovery Facilities . . . . . . . . . . 121
Mário Nunes, Rita Alves, Augusto Casaca, Pedro Póvoa,
and José Botelho

A New Reconfigurable Architecture with Applications to IoT


and Mobile Computing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Amir Masoud Gharehbaghi, Tomohiro Maruoka, and Masahiro Fujita

Unexpected Inferences from Sensor Data: A Hidden Privacy Threat


in the Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147
Jacob Kröger

Issues in Implementing a Data Integration Platform for Electric Vehicles


Using the Internet of Things . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160
Martin Smuts, Brenda Scholtz, and Janet Wesson

Working with IoT – A Case Study Detailing Workplace Digitalization


Through IoT System Adoption . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 178
Viktor Mähler and Ulrika Holmström Westergren

Opportunities for the Internet of Things in the Water, Sanitation


and Hygiene Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
Paula Kotzé and Louis Coetzee

Internet of Things: The Present Status, Future Impacts and Challenges


in Nigerian Agriculture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Funmilayo O. Bamigboye and Emmanuel O. Ademola

IoTutor: How Cognitive Computing Can Be Applied to Internet


of Things Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Suejb Memeti, Sabri Pllana, Mexhid Ferati, Arianit Kurti, and Ilir Jusufi

Author Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235


WCC 2018 Plenary Contributions:
Keynote, Special Sessions
Responsible Data Science
in a Dynamic World
The Four Essential Elements of Data Science

Wil M. P. van der Aalst(B)

Lehrstuhl für Informatik 9, Process and Data Science, RWTH Aachen University,
52056 Aachen, Germany
wvdaalst@pads.rwth-aachen.de
http://vdaalst.com

Abstract. Data science is changing our world in many different ways.


Data and the associated data science innovations are changing every-
thing: the way we work, the way we move, the way we interact, the way
we care, the way we learn, and the way we socialize. As a result, many
professions will cease to exist. For example, today’s call centers will dis-
appear just like video rental shops disappeared. At the same time, new
jobs, products, services, and opportunities emerge. Hence, it is impor-
tant to understand the essence of data science. This extended abstract
discusses the four essential elements of data science: “water” (availabil-
ity, magnitude, and different forms of data), “fire” (irresponsible uses of
data and threats related to fairness, accuracy, confidentiality, and trans-
parency), “wind” (the way data science can be used to improve pro-
cesses), and “earth” (the need for data science research and education).
Next to providing an original view on data science, the abstract also
highlights important next steps to ensure that data will not just change,
but also improve our world.

Keywords: Data science · Responsible data science · Process mining ·


Big data

1 Data Science
This extended abstract is based on a keynote given at the IFIP World Com-
puter Congress (WCC 2018) on 18 September 2018, in Poznan, Poland. The
main theme of WCC 2018 was “Information Processing in an Increasingly Con-
nected World: Opportunities and Threats”. Data science is the main driver for
the changes that create these opportunities and threats. Recent reports [6,7]
indicate that many jobs will cease to exist because of advances in machine learn-
ing, artificial intelligence, robotics, and other forms of smart automation. These
advances are only possible because of both the availability of data and progress
in data science.
It is not easy to define data science. The data science pipeline shown in Fig. 1
illustrates the breadth of the discipline. The “infrastructure” part of the pipeline
c The Author(s) 2019
L. Strous and V. G. Cerf (Eds.): IFIPIoT 2018, IFIP AICT 548, pp. 3–10, 2019.
https://doi.org/10.1007/978-3-030-15651-0_1
4 W. M. P. van der Aalst

scienfic
mechanical medicine workflows
engineering
social sciences
energy
high-tech
logiscs systems

infrastructure analysis effect


“volume and velocity” “extracting knowledge” “people, organizations, society”

o big data infrastructures o statistics o ethics & privacy


o distributed systems o data/process mining o IT law
o data engineering o machine learning o operations management
o programming o artificial intelligence o business models
o security o visualization o entrepreneurship
o ... o ... o ...

Fig. 1. The data science pipeline showing that different capabilities are needed to turn
data into value.

is concerned with the huge volume and incredible velocity of data. Hence, the
primary focus is on making things scalable and instant. The “analysis” part of
the pipeline is concerned with extracting knowledge. This is about providing
answers to known and unknown unknowns.1 The “effect” part of the pipeline is
concerned the impact of data science on people, organizations, and society. Here
legal, ethical, and financial aspects come into play.
The uptake of the Internet of Things (IoT) illustrates the pivotal role of data
science. More and more devices (light bulbs, clothes, refrigerators, containers,
bicycles, etc.) are connected to the internet and produce data. These devices are
becoming “smart” by learning from the data collected. The Internet of Things
(IoT) depends on the whole data science pipeline shown in Fig. 1. We are (or will
be) surrounded by smart devices collecting data and the impact of this cannot
be overestimated.
In the remainder, we define the four essential elements of data science.
As metaphor we use the classical four elements: “water”, “fire”, “wind”, and
“earth”. According to the Empedocles, a Greek pre-Socratic philosopher who
lived in Sicily in the fifth century B.C., all matter is comprised of these four
elements. Other ancient cultures had similar lists, sometimes also composed of
more elements (e.g., earth, water, air, fire, and aether) that tried to explain
nature and complexity of all matter in terms of simpler substances. Today, we
know that this is not the case. However, for data science, we are still in the phase
where we are looking for the essential elements. This paper uses “water” as a
placeholder for the availability of different forms of data, “fire” as a placeholder
for irresponsible uses of data (e.g., threats to fairness, accuracy, confidentiality,
1
“There are known knowns; there are things we know we know. We also know there
are known unknowns; that is to say we know there are some things we do not know.
But there are also unknown unknowns – the ones we don’t know we don’t know.”
(Donald Rumsfeld, February 12, 2002).
Responsible Data Science in a Dynamic World 5

and transparency), “wind” as a placeholder for the way that data science can
be used to improve processes, and “earth” as a placeholder for education and
research (i.e., the base of data science) underpinning all of this. These four essen-
tial elements are discussed in the remaining sections.

2 The “Water” of Data Science

The first essential element of data science (“water”) is the data itself. The
exponential growth of data is evident. Figure 2 (inspired by the analysis in [9])
shows the rapid developments in terms of costs (things are getting exponen-
tially cheaper), speed (things are going exponentially faster), and miniaturiza-
tion (things are getting exponentially smaller). This is not limited to processing
(i.e., CPU and GPU processors), but also applies to storage and communication.
Consider for example the costs of storage. To store one megabyte (MB) of data
in the sixties one would need to pay one million euros. Today, one can buy a
10TB harddisk for less than 300 euro, i.e., 0.00003 cents per MB. Another exam-
ple is the bandwidth efficiency, also called spectral efficiency, which refers to the
information rate that can be transmitted over a given bandwidth. It is the net
bitrate (useful information rate excluding error-correcting codes) or maximum
throughput divided by the bandwidth in hertz of a communication channel or a
data link. The spectacular progress of our data handling capabilities illustrated
by Fig. 2, explains why data science has become on of the key concerns in any
organization. In the sixties, we only had a few “drops of data” whereas today
we are facing a “tsunami of data” flooding our society.
Clearly, data science has its roots in statistics, a discipline that developed
over four centuries [1]. John Graunt (1620–1674) started to study London’s death
records around 1660. Based on this he was able to predict the life expectancy
of a person at a particular age. Francis Galton (1822–1911) introduced statis-
tical concepts like regression and correlation at the end of the 19th century.
Although data science can be seen as a continuation of statistics, the major-
ity of statisticians did not contribute much to recent progress in data science.
Most statisticians focused on theoretical results rather than real-world analysis
problems. The computational aspects, which are critical for larger data sets, are
typically ignored by statisticians. The focus is on generative modeling rather
than prediction and dealing with practical challenges related to data quality
and size. When the data mining community realized major breakthroughs in the
discovery of patterns and relationships (e.g., efficiently learning decision trees
and association rules), most statisticians referred to these discovery practices as
“data fishing”, “data snooping”, and “data dredging” to express their dismay
[1,4,10].
Put differently; most statisticians were focused on techniques to make reliable
statements given a few “drops of data”. Such viewpoints turned out to be less
effective when dealing with “tsunamis of data”.
6 W. M. P. van der Aalst

cheaper faster more compact


price per GB (€) latency (ms) GB/cm2
storage

1980 1990 2000 2010 2020 1980 1990 2000 2010 2020 1980 1990 2000 2010 2020

cost of a processing cycle (€) processor speed (MHz) transistors per chip
processing

1980 1990 2000 2010 2020 1980 1990 2000 2010 2020 1980 1990 2000 2010 2020

price per Mbps (€) download/upload speed (Mbps) bandwidth efficiency ((bit/s)/Hz)
communicaon

1980 1990 2000 2010 2020 1980 1990 2000 2010 2020 1980 1990 2000 2010 2020

Fig. 2. Moore’s law predicts an exponential growth of the number of transistors per
chip. This can be generalized to storage and transition and also applies to costs and
speed.

3 The “Fire” of Data Science


The second essential element of data science (“fire”) refers to the dangers of
using data in an irresponsible way. Data abundance combined with powerful
data science techniques has the potential to dramatically improve our lives by
enabling new services and products, while improving their efficiency and quality.
Many of today’s scientific discoveries (e.g., in health) are already fueled by devel-
opments in statistics, mining, machine learning, artificial intelligence, databases,
and visualization. At the same time, there are also great concerns about the use
of data. Increasingly, customers, patients, and other stakeholders are concerned
about irresponsible data use. Automated data decisions may be unfair or non-
transparent. Confidential data may be shared unintentionally or abused by third
parties.
From 2015 until 2017, the author led the Responsible Data Science (RDS)
initiative where the strongest Dutch data science groups joined forces to address
problems related to fairness, accuracy, confidentiality, and transparency (www.
responsibledatascience.org). The goal of RDS is to show that data science tech-
niques, infrastructures and approaches can be made responsible by design.
Responsible Data Science (RDS) revolves around four main challenges:
– Data science without prejudice - How to avoid unfair conclusions even if they
are true?
Responsible Data Science in a Dynamic World 7

– Data science without guesswork - How to answer questions with a guaranteed


level of accuracy?
– Data science that ensures confidentiality - How to answer questions without
revealing secrets?
– Data science that provides transparency - How to clarify answers such that
they become indisputable?

The term green data science was introduced for cutting-edge solutions that
enable individuals, organizations and society to benefit from widespread data
availability while ensuring Fairness, Accuracy, Confidentiality, and Transparency
(FACT) [2].
Naı̈vely one could think that “fire” can be controlled by “water”, however
this is not the case. When considering RDS, it is better to consider data as “oil”
rather than “water”. It needs to be controlled and stored carefully.
There is a need for new and positive data science techniques that are respon-
sible (i.e., “green”) by design. This cannot be solved by stricter laws. Using the
metaphor of “green energy”: We should not be against the use of energy (“data”),
but address the pollution caused by traditional engines. Fortunately, there are
plenty of ideas to make data science green. For example, discrimination-aware
data mining [8] can be used to ensure fairness and polymorphic encryption can
be used to ensure confidentiality.

4 The “Wind” of Data Science

The third essential element of data science (“wind”) is concerned with the way
data and processes interact. Storing and processing data is not a goal in itself.
Data are there to support processes. The campaign “The best run companies
run SAP” illustrates that the purpose of information systems is to ensure that
processes run well. Data science can help organizations to be more effective, to
provide a better service, to deliver faster, and to do all of this at lower costs.
This applies to logistics, production, transport, healthcare, banking, insurance,
and government. This also applies to individuals. Data science will increasingly
support our personal workflows and take over tasks, or at least support them.
Data (“water”) can be used to manage and support processes (“wind”) through
the use of data science technologies.
An emerging technology linking “water” and “wind” is process mining [1].
Process mining bridges the gap between traditional model-based process analysis
(e.g., simulation and other business process management techniques) and data-
centric analysis techniques such as machine learning and data mining. Process
mining seeks the confrontation between event data (i.e., observed behavior) and
process models (hand-made or discovered automatically) [1]. The process-mining
spectrum is broad and includes techniques for process discovery, conformance
checking, prediction, and bottleneck analysis. These techniques tend to be very
different from mainstream data mining and machine learning techniques which
are typically not process-centric.
8 W. M. P. van der Aalst

Consider for example the topic of Robotic Process Automation (RPA). RPA
is an umbrella term for tools that operate on the user interface of other com-
puter systems in the way a human would do. RPA aims to replace people by
automation done in an “outside-in” manner [3]. This differs from the classi-
cal “inside-out” approach to improve information systems. Unlike traditional
workflow technology, the information system remains unchanged. The robots are
replacing humans while leaving the back-end systems intact. RPA is a way to
support processes in a more cost-effective manner. However, this requires learn-
ing what humans do by observing them. Data science approaches like process
mining can be used to learn the behavior of people doing routine tasks. After
the desired behavior has been “played in”, it can be “played out” to handle new
cases in an intelligent manner.
RPA illustrates that data science will lead to new trade-offs between what
humans do and what robots do [6,7]. These trade-offs are interesting: How to
distribute work between given breakthroughs in data science? Obviously, the
question needs to take the “fire” dimension into account.

5 The “Earth” of Data Science

The fourth essential element of data science (“earth”) is concerned with the
foundations of a data-driven society: education and research. Education (in every
sense of the word) is one of the fundamental factors in the development of data
science. Data science education is needed at any level. People need to be aware
of the way algorithms make decisions that may influence their lives. Privacy
discussions reveal the ignorance of policy makers and end users. Moreover, to
remain competitive, countries should invest in data science capabilities. This can
only be realized through education. Data science research plays a similar role.
On the one hand, it is key for our education. On the other hand, research is
needed to address the many technological and societal challenges (e.g., ensuring
fairness, accuracy, confidentiality, and transparency).
Currently, eight of the world’s ten biggest companies, as measured by market
capitalization, are American: Apple, Alphabet (incl. Google), Microsoft, Ama-
zon, Berkshire Hathaway, Facebook, JPMorgan Chase, and Bank of America.2
The two remaining companies are Chinese: Alibaba and Tencent Holdings. This
shows the dominance of a few countries due to investments in IT. Most of the
companies are relatively new and emerged through the smart use of data. Ama-
zon and Alibaba are dominating the way we buy products. Google is controlling
the way we search. Facebook is controlling the way we socialize. Apple, Alpha-
bet, and Microsoft are controlling the platforms we use (iOS, Android, and
Windows). Consider for example Facebook. On the one hand, many people are
expressing concerns about the use of data. On the other hand, Facebook has
over 2 billion monthly active users that provide personal information in order to
use social media. One of the problems of data science is that due to economies

2
Based on market capitalization data by Bloomberg on 31 March 2018.
Responsible Data Science in a Dynamic World 9

of scale “the winner takes it all”. This may also apply to education, e.g., on
Coursera a few US universities are dominating data science education.

Fig. 3. The “water”, “fire”, “wind”, and “earth” of data science.

Data science literacy and major public investments are needed to address
these concerns. This cannot be left to “the market” or solved through half-
hearted legislation like the European General Data Protection Regulation
(GDPR) [5].

6 Epilogue
This extended abstract aimed to present some of the key messages of the keynote
presentation for the IFIP World Computer Congress (WCC 2018). It stresses
the importance of data science for people, organizations, and society. Just like
computer science emerged as a new discipline from mathematics in the early
eighties, we can now witness that the data science discipline is emerging from
computer science, statistics, and social sciences.
In this paper, we discussed the four essential elements of data science (see
Fig. 3): “water” (availability, magnitude, and different forms of data), “fire” (irre-
sponsible uses of data and threats related to fairness, accuracy, confidentiality,
and transparency), “wind” (the way data science can be used to improve pro-
cesses), and “earth” (the need for data science research and education). By pre-
senting data science in this manner, we hope to get more attention for process-
centric forms of data science (e.g., process mining), responsible data science,
data science education, and data science research. The dominance of a few com-
panies and countries when it comes to data science is undesirable and requires
10 W. M. P. van der Aalst

the attention of politicians and policymakers. The IFIP could and should play
an active role in this discussion.

References
1. van der Aalst, W.M.P.: Process Mining: Data Science in Action. Springer, Heidel-
berg (2016). https://doi.org/10.1007/978-3-662-49851-4 1
2. van der Aalst, W.M.P.: Responsible data science: using event data in a “People
Friendly” manner. In: Hammoudi, S., Maciaszek, L.A., Missikoff, M.M., Camp, O.,
Cordeiro, J. (eds.) ICEIS 2016. LNBIP, vol. 291, pp. 3–28. Springer, Cham (2017).
https://doi.org/10.1007/978-3-319-62386-3 1
3. van der Aalst, W.M.P., Bichler, M., Heinzl, A.: Robotic process automation. Bus.
Inf. Syst. Eng. 60(4), 269–272 (2018)
4. Breiman, L.: Statistical modeling: the two cultures. Stat. Sci. 16(3), 199–231 (2001)
5. European Commission: Proposal for a Regulation of the European Parliament and
of the Council on the Protection of Individuals with Regard to the Processing of
Personal Data and on the Free Movement of Such Data (General Data Protection
Regulation). 9565/15, 2012/0011 (COD), June 2015
6. Frey, C.B., Osborne, M.A.: The future of employment: how susceptible are jobs to
computerisation? Technol. Forecast. Soc. Change 114, 254–280 (2017)
7. Hawksworth, J., Berriman, R., Goel, S.: Will robots really steal our jobs? An
international analysis of the potential long term impact of automation. Technical
report, PricewaterhouseCoopers (2018)
8. Pedreshi, D., Ruggieri, S., Turini, F.: Discrimination-aware data mining. In: Pro-
ceedings of the 14th ACM SIGKDD International Conference on Knowledge Dis-
covery and Data Mining, pp. 560–568. ACM (2008)
9. Brennenraedts, R., Vankan, A., te Velde R., Minne, B., Veldkamp, J., Kaashoek,
B.: The impact of ICT on the Dutch economy. Technical report, Dialogic (2014)
10. Tukey, J.W.: The future of data analysis. Ann. Math. Stat. 33(1), 1–67 (1962)

Open Access This chapter is licensed under the terms of the Creative Commons
Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/),
which permits use, sharing, adaptation, distribution and reproduction in any medium
or format, as long as you give appropriate credit to the original author(s) and the
source, provide a link to the Creative Commons license and indicate if changes were
made.
The images or other third party material in this chapter are included in the chapter’s
Creative Commons license, unless indicated otherwise in a credit line to the material. If
material is not included in the chapter’s Creative Commons license and your intended
use is not permitted by statutory regulation or exceeds the permitted use, you will
need to obtain permission directly from the copyright holder.
How Three Poznan University Students Broke
the German Enigma Code and Shortened
World War Two

Roger G. Johnson(&)

School of Computer Science, Birkbeck University of London,


Malet Street, London WC1E 7HX, UK
rgj@dcs.bbk.ac.uk

Abstract. The story of the Allied breaking of the German Enigma codes in
World War 2 was first published in the 1970s. Even now many of the details,
especially concerning the critical work in the 1930s undertaken by gifted and
dedicated Polish codebreakers remains largely unknown. Their work is credited
with saving the Allies several years work and so shortening the war and saving
thousands of lives. The holding of the IFIP World Computer Congress in
Poznan, home of the Polish codebreakers, gave an opportunity for their work to
be highlighted to an international audience. Talks covering the work of the
Polish, British and French codebreakers were given and webcast worldwide. In
addition, a encoded Enigma message was sent at the start of the day from
Poznan to Bletchley Park in the UK where the volunteers of the Bombe team at
The National Museum of Computing successfully confirmed their breaking of
the message at the start of the afternoon session.

Keywords: Enigma  Code breaking  World War II  Marian Rejevski 


Jerzy Rozycki  Henryk Zygalski  Turing-Welchman Bombe

1 Background

In 1945 General Dwight D Eisenhower (Allied Supreme Commander Europe) wrote to


General Stewart Menzies (Head of Bletchley Park in the UK saying that the successful
reading of German messages had
“saved thousands of British and American lives and, in no small way, contributed to the speed
with which the enemy was routed and eventually forced to surrender”

The story of how the Allied forces broke the German Enigma code during World
War 2 has been told many times in recent years usually from a variety of perspectives
mostly linked to Bletchley Park in the UK. The critical contribution of the Polish
codebreakers remains little known outside Poland and only a limited number of books
and papers have been published about their work. The Polish codebreakers repeatedly
broke the Enigma code as its security features were steadily enhanced throughout the
1930s. The result was that as war was about to break out in 1939 the Poles were able to
give working replica Enigma machines to their French and British allies and to explain
how they had successfully broken the German Enigma messages up to that time.
© The Author(s) 2019
L. Strous and V. G. Cerf (Eds.): IFIPIoT 2018, IFIP AICT 548, pp. 11–20, 2019.
https://doi.org/10.1007/978-3-030-15651-0_2
12 R. G. Johnson

Without this dramatic gesture it is very unlikely that the British and French would
have been able to develop the codebreaking techniques which enabled the British to
read German Enigma traffic throughout most of World War 2 at Bletchley Park and
also the French until late 1942 at Bletchley Park’s French equivalent.
This paper summarises the story of the critical Polish contribution and how it was
built on by the French and British, most notably by the British mechanisation of the
most time-consuming part of finding the key each day by the building of machines
which were named Bombes. The Polish role is well documented in two books,
Kozaczuk (1984) first published in Polish in 1979 which focussed primarily on the
codebreaking and very recently in (Turing 2018) which recounts the codebreaking
exploits but also the lives of the codebreakers during and after this tempestuous period.
The holding of the IFIP World Congress in Poznan in Poland provided an ideal
opportunity for IFIP WG 9.7 on the History of Computing to celebrate the work of
three talented and heroic Polish mathematics students from the University of Poznan,
Marian Rejewski, Jerzy Rozycki and Henryk Zygalski, who trained in Poznan to
become codebreakers and whose work ultimately led to the significant shortening of
World War 2.
The author is a member of IFIP WG 9.7 and is also the Secretary of the Turing
Welchman Bombe Rebuild Trust (TWBRT) which owns the replica Bombe completed
in 2007 and is demonstrated every week at The National Museum of Computing
(TNMoC) housed in Block H of Bletchley Park in the UK. He arranged for the
TWBRT Bombe team to hold one of its occasional roadshow events in which an
Enigma message is sent from a remote location to the Bombe Team at TNMoC who
then attempt to break the code and send back confirmation of the message being
successfully read.

2 Enigma Machine

The origins of the Enigma coding machine were with a commercial coding machine
built by a German electrical engineer named Arthur Scherbius. He obtained several
patents for his machines starting in 1918. The device evolved into a portable device
about the size of a typewriter powered by batteries. Having initially failed to interest the
German armed forces in his machine he sold them as commercial coding machines for
use by financial institutions such as banks to protect commercially sensitive informa-
tion being sent by telegraph and other devices. Turing (2018) records that in 1926 both
the British and Polish authorities had obtained commercial examples to study while he
also notes that, in the same year, German Navy signals using an Enigma machine are
noted for the first time.
Following the largely static army operations of the First World War, military
strategists developed ideas for future mobile land warfare. However, a critical issue
would be to create effective communications for command and control of relatively
small frontline military units. In addition, naval commanders, especially with a growing
force of submarines, needed secure two-way communications to maintain contact with
their forces. What was required was a secure coding machine which, given its presence
close to the frontline in mobile warfare, could sooner or later be captured by the enemy
How Three Poznan University Students Broke the German Enigma Code 13

without compromising the security of the communications network. This need for
portable, secure communications potentially across large distances, was the capability
the Enigma machine provided. Figure 1 shows a German army Enigma machine.

Fig. 1. Three wheel Enigma machine

The key features of the Enigma machine were a conventional German keyboard
and above it lamps which light each time a key is pressed with the enciphered character
corresponding to the key pressed. Above the lamps are the three rotor wheels. Each
time a key is depressed the righthand rotor advances one step and after one revolution
the adjacent rotor advances one step and similarly with the leftmost rotor. Each rotor
has the letters of the alphabet around the rim and every letter is wired to another letter
elsewhere on the rotor. Thus a letter “A” typed on the keyboard may emerge from the
first rotor as “K” and so on through the other two rotors. The electric current then
reaches the plugboard on the front of the machine where 20 of the 26 letters are again
wired up in pairs after which it returns through the wheels until it lights up a lamp on
the machine. The Army Enigma machine ultimately had five rotors and on any day
three would be used in a predefined arrangement of rotors. The result of all these
different combinations is to produce over 150 million alternatives. A very compre-
hensive account of the evolution of the Enigma coding machine is provided in (Perera
2010).
It was this extraordinary number of combinations which several times later in the
war led the Germans to conclude, in the face of circumstantial evidence to the contrary
such as dramatic increases in submarine losses after the Allied breaking of the naval
Enigma, that the Enigma machine had in fact not been broken but that there was an
14 R. G. Johnson

alternative explanation, such as espionage or allied technological advances, for sig-


nificant German setbacks.
It is worth noting that other military powers, including Britain, also adopted coding
machines which made use of rotors. It was fundamentally a good approach to auto-
mated enciphering of messages in an electro-mechanical era.

3 Poland and Germany

The inter-war Polish state was a creation of the Versailles Peace treaty. It was situated
between Germany and Russia and the Polish authorities trusted neither. In the turmoil
following the Russian revolution, the Polish government regarded the German state of
the later 1920s as a bigger potential threat than the Soviet Union. Also Soviet codes
were still using First World war techniques and so liable to successful attack.
Initial attempts to break German Enigma messages using the commercially avail-
able Enigma machine failed. Obviously the machine had been modified. Any attack on
the machine would need trained cryptographers and so a special course was run at the
University of Poznan which was in a part of Poland which had formerly been part of
Germany and hence had many fluent German speakers. In 1929 20 students were
recruited to the course. Further attempts at breaking into Enigma still yielded nothing
until in 1932 the French recruited a spy, Hans-Thilo Schmidt, who worked as a civilian
in the German Army’s cryptography unit. To fund an extravagant life style he needed
money and proceeded to sell large numbers of photographs of secret files relating to the
work of the cryptographic unit to the French.
Unfortunately without a German military Enigma machine the French realised that
the photographs of the operating instructions were of no immediate value. The British
when offered the photographs came to the same conclusion. The French then
approached the Poles who expressed more interest but asked for more information.
Gradually through the first half of 1932 the French obtained more and more material
from Hans-Thilo Schmidt until finally, in August 1932, they obtained an encrypted
message together with the original text. With the other secret material already obtained,
it now appeared that it might be possible to reverse engineer the Enigma machine, in
particular the wiring of the rotors.
The first recruit to the Polish Cypher Bureau from the Poznan course was Marian
Rejewski. Initially he worked on Enigma in the evening after his colleagues in the
Cypher Bureau had gone home. Later on it became a full time but still secret project.
Month by month he gradually worked out the wiring inside the machine. While for
their part the French continued to supply more secret intelligence from Hans-Thilo
Schmidt. The final problem to be overcome, once the wiring of the Enigma machine
had been worked out was to determine a way to find which rotors were being used, in
what order they had been placed into the machine and the starting position for each of
the rotors. Marian Rejewski noticed that each message began with the starting position
sent twice.
How Three Poznan University Students Broke the German Enigma Code 15

Fig. 2. Marian Rejevski, Jerzy Rozycki, Henryk Zygalski

Marian Rejevski was now joined by two more graduates of the Poznan course.
They were Jerzy Rozycki and Henryk Zygalski (Fig. 2). From the stolen operating
instructions they knew that the Germans sent the starting position twice at the start of
each message and they realised that during the encipherment almost certainly only the
righthand wheel turned while the others remained stationery. Studying the patterns
enabled them to devise simple lookup methods to find the arrangement of the rotors and
also some of the plugboard settings. Further they realised that what they needed was a
working copy of an Enigma machine. Starting with an old commercial machine as a
model, the Poles constructed in utmost secrecy a small number of machines func-
tionally the same as the then current German Enigma machine complete with correctly
wired rotors and a plugboard.
The procedures used by the Germans continued to evolve. Gradually rotor orders
were changed more frequently until in October 1936 they were changed daily. Sloppy
operating practices were eliminated and more cables were used on the plugboard.
A major change took place as war clouds gathered in 1938 when the Germans intro-
duced two new rotors, making five in total, and changed their operating procedure to
use a different initial wheel position for each message. Each time the Poles responded
with new techniques to re-establish the setup of the machine so that messages could be
successfully read.

4 Sharing with Britain and France

By 1938 both the British and French cryptographers had looked at approaches to
breaking the Enigma messages but had made little progress with the latest German
versions of the machine. They had only succeeded in breaking into simpler versions of
Enigma used in the Spanish Civil War and also the less advanced Italian system.
The Munich crisis of 1938 caused both to examine their readiness for war which led
to a substantial exchange of information about Enigma. The French knew from the
intelligence they had supplied to the Poles that the Poles had probably made some
progress but the British appear to have been unaware of the possible significance of the
Polish work. However, the major changes by the German in late 1938 had stretched the
16 R. G. Johnson

Polish resources close to breaking point. Their productivity in breaking into Enigma
had dwindled dramatically.
In December 1938 the French proposed holding a three way conference in Paris
between France, Britain and Poland at which the French hoped to find out what
progress each had made. The meeting, held in January 1939, went badly with each
party revealing only very limited amounts of information. However, it was clear to each
party that the others were serious in their commitment to break into Enigma and so
contacts were maintained through the spring and summer of 1939.
The next meeting was to be truly momentous but neither the British or French knew
in advance. At the end of June 1939 the Poles, knowing through Enigma and other
intelligence that Germany was preparing to invade Poland, invited the British and the
French to Warsaw for a meeting. Thus it was in late July 1939 Alastair Denniston,
Head of Bletchley Park and Dilly Knox, Britain’s leading cryptographer and their
principal expert on Enigma travelled across Nazi Germany by train to Poland. The
French were represented by Gustav Bertrand, Denniston’s opposite number and his
deputy, Henri Braquenie. The Poles sent their trio of Rejewski, Rozycki and Zygalski
together with their boss, Maksymilian Ciezki.
On the day following their arrival they were driven to the Poles’ secret intelligence
HQ at Pyry on the outskirts of Warsaw. To the amazement of the French and British the
Poles announced almost immediately that they had broken Enigma some years earlier.
The Poles showed them a variety of devices which they used to help determine each
day’s Enigma settings. Discussions continued next day as the Poles revealed more of
their methods for breaking the code. However, without doubt, the highpoint was the
offer by the Poles to donate to both the French and the British one of their precious
working replica Enigma machines. The two machines left Poland by diplomatic bag for
Paris and so, probably unnoticed by fellow travellers, Stewart Menzies, the Deputy
Head of the British Secret Intelligence Service greeted Gustav Bertrand, the Head of
the French Codebreakers as he arrived at Victoria Station in August 1939 with a large
wooden box containing the priceless Enigma machine donated to the British.
At this point Alan Turing enters the story. He had been working part time on the
Enigma problem at Cambridge since 1938 but had not made much progress. Following
the Pyry meeting, Knox had shared with Turing all the information that the Poles had
provided, including their mechanical devices for finding the key of the day. Very
rapidly Turing conceived of an electro-mechanical machine to search for feasible
solutions for the rotor starting positions based on a technique of guessing what the
often stylised clear text of the German Enigma message might be. This specification for
a machine was handed to BTM, the UK’s leading punched card equipment manufac-
turer who were closely tied to IBM based in the USA, to turn into a physical reality.
A clear and full account of what became known as the Turing Welchman Bombe
and how it was used is given in (Turing 2014).
How Three Poznan University Students Broke the German Enigma Code 17

5 After the Polish Invasion

On September 1st 1939 Germany invaded Poland and by the end of the month Polish
resistance had collapsed. Poland was divided into three with large parts being assim-
ilated by Germany in the west and the Soviet Union in the east with a small central area
under the control of the Polish General Government. The Poles had planned for an
invasion and destroyed evidence of their Enigma codebreaking work. It was vital that
the codebreakers got away and so travelling by train and lorry they fled to Romania
where they went first to the British Embassy who did not appreciate their significance
and asked them to return the following day after the staff had contacted London.
However, if they had been caught by the Romanian secret police they would probably
be handed over to the Gestapo. Consequently, the Poles moved on immediately to the
French Embassy who recognised their links with the French Secret Service and assisted
them to reach France where they were met at the border by a representative sent by
Gustav Bertrand. Knox and Denniston were not amused to find that the French had
now got all the key Polish Enigma experts.
There followed a period of cooperation between Bletchley Park and the French
codebreakers now established in the Chateau de Vignolles near Paris. The two groups
were linked by a secure landline and from early 1940 there were daily races to find the
Enigma key of the day. However, this period was not to last long. Early in May 1940
the German Army attacked the French and British forces in the West and on June 25th
an armistice was signed between Germany and France. This divided France into two
main areas – Occupied France in the north and “Free France” in the south with its
government based in the small spa town of Vichy. From there, the Vichy government
ran both Vichy France and also the whole of the worldwide French colonial empire.
In the anticipation that there might be an underground resistance movement within
Vichy France, the armistice permitted the Vichy government to maintain a small
codebreaking capability to track them down although they were expressly forbidden
from intercepting German messages. Bertrand’s group, including the Poles, moved to
form this group now relocated to a small chateau outside Uzes near Nimes in southern
France. The group now continued to intercept message traffic including German
Enigma messages. Intelligence obtained, depending on its contents, could be passed to
the Vichy authorities or to other groups. Bertrand’s group built up a network of links
across north Africa and Portugal supplying intelligence directly and through interme-
diaries to the British as well as De Gaulle’s Free French and the Polish Government in
exile in London and received equipment, finance and other benefits in exchange.
Assorted codebreakers travelled between the chateau at Uzes and north Africa to
meet with other units working there. One of these trips ended in disaster when in
January 1942 Jerzy Rozycki was drowned, when the ship on which travelling back to
France from Algiers foundered in heavy seas with a substantial loss of life.
North Africa was in a very fluid state with many loose loyalties. In some places,
such as Tangier, which had an international zone, officials as well as agents from many
of the warring powers rubbed shoulders throughout the conflict. Fascinating insights
into this period are to be found in (Pidgeon 2008) which includes material on North
Africa.
18 R. G. Johnson

In November 1942, German and Italian forces took over Vichy France. The Ger-
man authorities and their Vichy collaborators were closing in on the radio transmis-
sions from the chateau. It was decided that the Poles should leave. The British
concluded that the Poles were too numerous to be flown out. The other alternatives
were to attempt an evacuation by sea, or overland via Switzerland or Spain. However
the route into Switzerland was now effectively closed. Attempts to evacuate by sea
proved too dangerous. Consequently in early January 1943 groups of Polish code-
breakers began to travel across France towards the Pyrenees and the Spanish border.
Marian Rejewski and Henryk Zygalski managed with some difficulty to cross the
Spanish border together. In common with most undocumented entrants into Spain they
were jailed by the Spanish authorities. However, as the German and Italian armies
suffered reverses the attitude of the Spanish authorities softened. Finally, starting in
April 1943 the prison camps were gradually emptied. Marian Rejewski and Henryk
Zygalski were finally released and by stages travelled via Portugal and Gibraltar to the
UK. Having regained their freedom they were once again part of the Polish armed
forces. They were attached to a team based near Hemel Hempstead which worked on
Russian codes for the remainder of the war.
When peace returned to Europe in May 1945, Marian Rejewski and Henryk
Zygalski both faced a difficult choice, whether to return to Poland or to find a new
home. Marian Rejewski had a wife and two small children in Poland and so he decided
to return to his homeland. Returnees were often regarded with suspicion by the new
communist authorities in Poland. Although his career as an accountant was interfered
with by the authorities due to suspicions about his wartime work he survived to be
honoured by Poland prior to his death in 1980 for his services to the defeat of Germany
as the Polish political environment evolved. Henryk Zygalski in contrast had met a
British girl during his wartime work in the UK. He became a British citizen and settled
down to an academic career in the UK ultimately as a member of staff of the Math-
ematics Department of the University of Surrey. He remained in contact with Marian
Rejewski until his death in 1978.

6 Celebration at WCC 2018

At the IFIP World Congress in Poznan in Poland IFIP WG 9.7 on the History of
Computing held a stream on computing in eastern Europe. One of the most significant
events of World War 2 was the breaking of the German Enigma codes. As noted
earlier, the contribution of the British codebreakers has been widely described but the
work of the Poles has been largely unacknowledged.
The Congress provided an opportunity to put right this omission. The day cele-
brated the work of three talented and heroic Polish mathematics students from the
University of Poznan, Marian Rejewski, Jerzy Rozycki and Henryk Zygalski, who
trained in Poznan to become codebreakers and whose work ultimately led to the
significant shortening of World War 2. The event attracted significant media interest
including TV and radio in both Poland and the UK. The event was also webcast and is
currently available online (YouTube 2018).
Another random document with
no related content on Scribd:
that, if the thief does not restore the stolen property, he will be a
dead man within a month.34.1
Similarly in Nias, an island to the west of
Thieves cursed in Sumatra, when a thief cannot be found he is
Nias.
cursed, and to give weight to the curse a dog is
burned alive. While the animal is expiring in torments, the man who
has been robbed expresses his wish that the thief may likewise die
in agony; and they say that thieves who have been often cursed do
die screaming.34.2 Curses are also employed for
Thieves cursed
among the Sea
the same purpose with excellent effect by the Sea
Dyaks of Borneo. Dyaks of Borneo. On this point a missionary bears
the following testimony. “With an experience of
nearly twenty years in Borneo, during which I came into contact with
thousands of the people, I have known of only two instances of theft
among the Dyaks. One was a theft of rice. The woman who lost the
rice most solemnly and publicly cursed the thief, whoever it might be.
The next night the rice was secretly left at her door. The other was a
theft of money. In this case, too, the thief was cursed. The greater
part of the money was afterwards found returned to the box from
which it had been abstracted. Both these incidents show the great
dread the Dyak has of a curse. Even an undeserved curse is
considered a terrible thing, and, according to Dyak law, to curse a
person for no reason at all is a fineable offence.
“A Dyak curse is a terrible thing to listen to. I have only once heard
a Dyak curse, and I am sure I do not want to do so again. I was
travelling in the Saribas district, and at that time many of the Dyaks
there had gone in for coffee-planting; indeed, several of them had
started coffee plantations on a small scale. A woman told me that
some one had over and over again stolen the ripe coffee-berries
from her plantation. Not only were the ripe berries stolen, but the
thief had carelessly picked many of the young berries and thrown
them on the ground, and many of the branches of the plants had
been broken off. In the evening, when I was seated in the public part
of the house with many Dyak men and women round me, we
happened to talk about coffee-planting. The woman was present,
and told us of her experiences, and how her coffee had been stolen
by some thief, who, she thought, must be one of the inmates of the
house. Then she solemnly cursed the thief. She began in a calm
voice, but worked herself up into a frenzy. We all listened horror-
struck, and no one interrupted her. She began by saying what had
happened, and how these thefts had gone on for some time. She
had said nothing before, hoping that the thief would mend his ways;
but the matter had gone on long enough, and she was going to curse
the thief, as nothing, she felt sure, would make him give up his evil
ways. She called on all the spirits of the waters and the hills and the
air to listen to her words and to aid her. She began quietly, but
became more excited as she went on. She said something of this
kind:
“ ‘If the thief be a man, may he be unfortunate in
Curses on a man all he undertakes! May he suffer from a disease
thief.
that does not kill him, but makes him helpless—
always in pain—and a burden to others. May his wife be unfaithful to
him, and his children become as lazy and dishonest as he is himself.
If he go out on the war-path, may he be killed, and his head smoked
over the enemy’s fire. If he be boating, may his boat be swamped
and may he be drowned. If he be out fishing, may an alligator kill him
suddenly, and may his relatives never find his body. If he be cutting
down a tree in the jungle, may the tree fall on him and crush him to
death. May the gods curse his farm so that he may have no crops,
and have nothing to eat, and when he begs for food, may he be
refused, and die of starvation.
“ ‘If the thief be a woman, may she be childless,
Curses on a woman or if she happen to be with child let her be
thief.
disappointed, and let her child be still-born, or,
better still, let her die in childbirth. May her husband be untrue to her,
and despise her and ill-treat her. May her children all desert her if
she live to grow old. May she suffer from such diseases as are
peculiar to women, and may her eyesight grow dim as the years go
on, and may there be no one to help her or lead her about when she
is blind.’
“I have only given the substance of what she said; but I shall never
forget the silence and the awed faces of those who heard her. I left
the house early next morning, so I do not know what was the result
of her curse—whether the thief confessed or not.”36.1
The ancient Greeks seem to have made a very
Thieves cursed in liberal use of curses as a cheap and effective
ancient Greece.
mode of protecting property, which dispenses the
injured party from resorting to the tedious, expensive, and too often
fruitless formalities of the law. These curses they inscribed on tablets
of lead and other materials and deposited either in the place which
was to be protected from depredation or in the temple of the god to
whose tender mercies the criminal was committed. For example, in a
sacred precinct dedicated to Demeter, Persephone, Pluto and other
deities of a stern and inflexible temper at Cnidus, a number of leaden
tablets were found inscribed with curses which consigned the
malefactors of various sorts to the vengeance of the two Infernal
Goddesses, Demeter and her daughter. “May he or she never find
Persephone propitious!” is the constantly repeated burden of these
prayers; and in some of them the sinner is not only excommunicated
in this world but condemned to eternal torments in the world
hereafter. Often the persons who launched these curses were ladies.
One irate dame consigns to perdition the thief who had stolen her
bracelet or the defaulter who had failed to send back her
underclothes.36.2 Another curse, engraved on a marble slab found at
Smyrna, purports that if any man should steal one of the sacred
vessels of a certain goddess or injure her sacred fish, he may die a
painful death, devoured by the fishes.36.3 Sometimes, apparently,
these Greek imprecations were as effective in reclaiming sinners as
Dyak curses are to this day. Thus we read of a curious dedication to
a lunar deity of Asia Minor, by name Men Aziottenos, which declares
how one Artemidorus, having been reviled by a couple of rude
fellows, cursed them in a votive tablet, and how one of the culprits,
having been punished by the god, made a propitiatory offering and
mended his wicked ways.37.1 To prevent people
Landmarks
protected by gods
from encroaching on their neighbours’ land by
and curses. removing the boundary stones, the Greeks
committed landmarks to the special protection of
the great god Zeus;37.2 and Plato dwells with unction on the double
punishment, divine and human, to which the sinner exposed himself
who dared to tamper with these sacred stones.37.3 The Romans
went even further, for they created a god for the sole purpose of
looking after landmarks, and he must have had his hands very full if
he executed all the curses which were levelled not only at every man
who shifted his neighbour’s boundary stone, but even at the oxen
which he employed to plough up his neighbour’s land.37.4 The
Hebrew code of Deuteronomy pronounced a solemn curse on such
as removed their neighbour’s landmarks;37.5 and Babylonian kings
exhausted their imagination in pouring out a flood of imprecations
against the abandoned wretch who thus set at naught the rights of
property in land.37.6 King Nebuchadnezzar in particular, before he
was turned out to grass, appears to have distinguished himself by
the richness and variety of his execrations, if we may judge by a
specimen of them which has survived. A brief extract from this
masterpiece may serve to illustrate the king’s style of minatory
eloquence. Referring to the bold bad man, “be it shepherd or
governor, or agent or regent, levy master or magistrate,” whosoever
he might be, who “for all days to come, for the future of human
habitations,” should dare to tamper with the land which his Majesty
had just marked out, “Ninib, lord of boundaries and boundary-stones,
tear out his boundary stone. Gula, great lady, put lingering illness
into his body, that dark and light red blood he may pour out like
water. Ishtar, lady of countries, whose fury is a flood, reveal
difficulties to him, that he escape not from misfortune. Nusku, mighty
lord, powerful burner, the god, my creator, be his evil demon and
may he burn his root. Whoever removes this stone, in the dust hides
it, burns it with fire, casts it into water, shuts it up in an enclosure,
causes a fool, a deaf man, an idiot to take it, places it in an invisible
place, may the great gods, who upon this stone are mentioned by
their names, curse him with an evil curse, tear out his foundation and
destroy his seed.”38.1
In Africa also superstition is a powerful ally of
Superstition as an the rights of private property. Thus the Balonda
ally of the rights of
private property in place beehives on high trees in the forest and
Africa. protect them against thieves by tying a charm or
“piece of medicine” round the tree-trunks. This
proves a sufficient protection. “The natives,” says Livingstone,
“seldom rob each other, for all believe that certain medicines can
inflict disease and death; and though they consider that these are
only known to a few, they act on the principle that it is best to let
them all alone. The gloom of these forests strengthens the
superstitious feelings of the people. In other quarters, where they are
not subjected to this influence, I have heard the chiefs issue
proclamations to the effect, that real witchcraft medicines had been
placed at certain gardens from which produce had been stolen; the
thieves having risked the power of the ordinary charms previously
placed there.”38.2
The Wanika of East Africa “believe in the power
The Wanika of East and efficacy of charms and amulets, and they
Africa.
wear them in great variety; legs, arms, neck, waist,
hair, and every part of the body are laden with them, either for the
cure or prevention of disease; for the expulsion or repulsion of evil
spirits; and to keep at bay snakes, wild animals, and every other evil.
They hang painted calabashes from the baobab at their hut doors to
keep away thieves; shells, dolls, eggs scratched over with Arabic
characters by the Wana Chuoni (sons of the book) of the coast, are
placed about their plantations and in their fruit-trees, and they
believe that death would overtake a thief who should disregard them.
A charm bound to the leg of a fowl is ample protection for the village.
There is no doubt that, superstitious as the people are, they dread
running great risks for the sake of small gains, and so these charms
answer their purpose.”39.1 Among the Boloki of the
The Boloki of the
Congo.
Upper Congo, when a woman finds that the
cassava roots, which she keeps soaking in a
water-hole, are being stolen, she takes a piece of gum copal, and
fixing it in the cleft of a split stick she puts it on the side of the hole,
while at the same time she calls down a curse on the thief. If the thief
is a man, he will henceforth have no luck in fishing; if she is a
woman, she will have no more success in farming.39.2 The Ekoi of
Southern Nigeria protect their farms against thieves by bundles of
palm leaves to which they give the name of okpata. Should any one
steal from a farm thus protected, he will fall sick and will not recover
unless he gives a certain dance, to which the name of okpata is also
applied.39.3
In the mountains of Marrah, a district of Darfur,
Guardian spirits houses, goods, and cattle are protected against
(damzogs) of
property in Darfur. thieves by certain fierce and dangerous guardian-
spirits called damzogs, which can be bought like
watch dogs. Under the guardianship of such a spiritual protector the
sheep and cows are left free to wander at will; for if any one were
rash enough to attempt to steal or kill one of the beasts, his hand
with the knife in it would remain sticking fast to the animal’s throat till
the owner came and caught the rascal. An Arab merchant, travelling
in Darfur, received from a friend the following account of the way to
procure one of these useful guardians. “At the time when I first
began to trade, my friend, I often heard that damzogs could be
bought and sold, and that to procure one I must apply to the owner
of a damzog, and discuss the price with him. When the bargain is
concluded, it is necessary to give a large gourd of milk to the seller,
who takes it to his house, where are his damzogs. On entering he
salutes them, and goes and hangs up his vase to a hook, saying,
—‘One of my friends—such a one—very rich, is in fear of robbers,
and asks me to supply him with a guardian. Will one of you go and
live in his house? There is plenty of milk there, for it is a house of
blessing, and the proof thereof is, that I bring you this kara of milk.’
The damzogs at first refuse to comply with the invitation. ‘No, no,’
say they, ‘not one of us will go.’ The master of the hut conjures them
to comply with his desires, saying, ‘Oh! let the one that is willing
descend into the kara.’ He then retires a little, and presently one of
the damzogs is heard to flop into the milk, upon which he hastens
and claps upon the vase a cover made of date-leaves. Thus stopped
up he unhooks the kara, and hands it over to the buyer, who takes it
away and hangs it on the wall of his hut, and confides it to the care
of a slave or of a wife, who every morning comes and takes it,
emptying out the milk, washing it and replenishing it, and hanging it
up again. From that time forward the house is safe from theft or
loss.” The merchant’s informant, the Shereef Ahmed Bedawee, had
himself purchased one of these guardian spirits, who proved most
vigilant and efficient in the discharge of his duties; indeed his zeal
was excessive, for he not only killed several slaves who tried to rob
his master, but did summary execution on the Shereef’s own son,
when the undutiful young man essayed to pilfer from his father’s
shop. This was too much for the Shereef; he invited a party of friends
to assist him in expelling the inflexible guardian. They came armed
with guns and a supply of ammunition, and by raking the shop with
repeated volleys of musketry they at last succeeded in putting the
spirit to flight.40.1
Amongst the Nandi of British East Africa nobody
The curses of dares to steal anything from a smith; for if he did,
smiths and potters.
the smith would heat his furnace, and as he blew
the bellows to make the flames roar he would curse the thief so that
he would die. And in like manner among these people, with whom
the potters are women, nobody dares to filch anything from a potter;
for next time she heated her wares the potter would curse him,
saying, “Burst like a pot, and may thy house become red,” and the
thief so cursed would die.41.1 In Loango, when a
Charms to protect
property in West
man is about to absent himself from home for a
Africa. considerable time he protects his hut by placing a
charm or fetish before it, consisting perhaps of a
branch with some bits of broken pots or trash of that sort; and we are
told that even the most determined robber would not dare to cross a
threshold defended by these mysterious signs.41.2 On the coast of
Guinea fetishes are sometimes inaugurated for the purpose of
detecting and punishing certain kinds of theft; and not only the culprit
himself, but any person who knows of his crime and fails to give
information is liable to be punished by the fetish. When such a fetish
is instituted, the whole community is warned of it, so that he who
transgresses thereafter does so at his peril. For example, a fetish
was set up to prevent sheep-stealing and the people received
warning in the usual way. Shortly afterwards a slave, who had not
heard of the law, stole a sheep and offered to divide it with a friend.
The friend had often before shared with him in similar enterprises,
but the fear of the fetish was now too strong for him; he informed on
the thief, who was brought to justice and died soon after of a
lingering and painful disease. Nobody in the country ever doubted
but that the fetish had killed him.41.3 Among the Ewe-speaking tribes
of the Slave Coast in West Africa houses and household property
are guarded by amulets (võ-sesao), which derive their virtue from
being consecrated or belonging to the gods. The crops, also, in
solitary glades of the forest are left under the protection of such
amulets, generally fastened to long sticks in some conspicuous
position; and so guarded they are quite safe from pillage. By the side
of the paths, too, may be seen food and palm-wine lying exposed for
sale with nothing but a charm to protect them; a few cowries placed
on each article indicate its price. Yet no native would dare to take the
food or the wine without depositing its price; for he dreads the
unknown evil which the god who owns the charm would bring upon
him for thieving.42.1 In Sierra Leone charms, called greegrees, are
often placed in plantations to deter people from stealing, and it is
said that “a few old rags placed upon an orange tree will generally,
though not always, secure the fruit as effectually as if guarded by the
dragons of the Hesperides. When any person falls sick, if, at the
distance of several months, he recollects having stolen fruit, etc., or
having taken it softly as they term it, he immediately supposes
wangka has caught him, and to get cured he must go or send to the
person whose property he had taken, and make to him whatever
recompense he demands.”42.2
Superstitions of the same sort have been
Charms to protect transported by the negroes to the West Indies,
property in the West
Indies. where the name for magic is obi and the magician
is called the obeah man. There also, we are told,
the stoutest-hearted negroes “tremble at the very sight of the ragged
bundle, the bottle or the egg-shells, which are stuck in the thatch or
hung over the door of a hut, or upon the branch of a plantain tree, to
deter marauders.… When a negro is robbed of a fowl or a hog, he
applies directly to the Obeah-man or woman; it is then made known
among his fellow blacks, that obi is set for the thief; and as soon as
the latter hears the dreadful news, his terrified imagination begins to
work, no resource is left but in the superior skill of some more
eminent Obeah-man of the neighbourhood, who may counteract the
magical operations of the other; but if no one can be found of higher
rank and ability; or if, after gaining such an ally, he should still fancy
himself affected, he presently falls into a decline, under the incessant
horror of impending calamities. The slightest painful sensation in the
head, the bowels, or any other part, any casual loss or hurt, confirms
his apprehensions, and he believes himself the devoted victim of an
invisible and irresistible agency. Sleep, appetite and cheerfulness
forsake him; his strength decays, his disturbed imagination is
haunted without respite, his features wear the settled gloom of
despondency: dirt, or any other unwholesome substance, becomes
his only food, he contracts a morbid habit of body, and gradually
sinks into the grave.”43.1 Superstition has killed him.
Similar evidence might doubtless be multiplied,
Conclusion. but the foregoing cases suffice to shew that
among many peoples and in many parts of the
world superstitious fear has operated as a powerful motive to deter
men from stealing. If that is so, then my second proposition may be
regarded as proved, namely, that among certain races and at certain
times superstition has strengthened the respect for private property
and has thereby contributed to the security of its enjoyment.
IV.
MARRIAGE

I pass now to my third proposition, which is, that


Superstition as a among certain races and at certain times
prop of sexual
morality. superstition has strengthened the respect for
marriage, and has thereby contributed to a stricter
observance of the rules of sexual morality both among the married
and the unmarried. That this is true will appear, I think, from the
following instances.
Among the Karens of Burma “adultery, or
Adultery or fornication, is supposed to have a powerful
fornication
supposed by the influence to injure the crops. Hence, if there have
Karens to blight the been bad crops in a village for a year or two, and
crops. the rains fail, the cause is attributed to secret sins
of this character, and they say the God of heaven
and earth is angry with them on this account; and all the villagers
unite in making an offering to appease him.” And
Pig’s blood used to when a case of adultery or fornication has come to
expiate the crime.
light, “the elders decide that the transgressors
must buy a hog, and kill it. Then the woman takes one foot of the
hog, and the man takes another, and they scrape out furrows in the
ground with each foot, which they fill with the blood of the hog. They
next scratch the ground with their hands and pray: ‘God of heaven
and earth, God of the mountains and hills, I have destroyed the
productiveness of the country. Do not be angry with me, do not hate
me; but have mercy on me, and compassionate me. Now I repair the
mountains, now I heal the hills, and the streams and the lands. May
there be no failure of crops, may there be no unsuccessful labours,
or unfortunate efforts in my country. Let them be dissipated to the
foot of the horizon. Make thy paddy fruitful, thy rice abundant. Make
the vegetables to flourish. If we cultivate but little, still grant that we
may obtain a little.’ After each has prayed thus, they return to the
house and say they have repaired the earth.”45.1 Thus, according to
the Karens adultery and fornication are not simply moral offences
which concern no one but the culprits and their families: they
physically affect the course of nature by blighting the earth and
destroying its fertility; hence they are public crimes which threaten
the very existence of the whole community by cutting off its food
supplies at the root. But the physical injury which these offences do
to the soil can be physically repaired by saturating it with pig’s blood.
Some of the tribes of Assam similarly trace a
Disastrous effects connexion between the crops and the behaviour of
ascribed to sexual
crime in Assam, the human sexes; for they believe that so long as
Bengal, and the crops remain ungarnered, the slightest
Annam.
incontinence would ruin all.45.2 Again, the
inhabitants of the hills near Rajamahal in Bengal imagine that
adultery, undetected and unexpiated, causes the inhabitants of the
village to be visited by a plague or destroyed by tigers or other
ravenous beasts. To prevent these evils an adulteress generally
makes a clean breast. Her paramour has then to furnish a hog, and
he and she are sprinkled with its blood, which is supposed to wash
away their sin and avert the divine wrath. When a village suffers from
plague or the ravages of wild beasts, the people religiously believe
that the calamity is a punishment for secret immorality, and they
resort to a curious form of divination to discover the culprits, in order
that the crime may be duly expiated.45.3 The Khasis of Assam are
divided into a number of clans which are exogamous, that is to say,
no man may marry a woman of his own clan. Should a man be found
to cohabit with a woman of his own clan, it is treated as incest and is
believed to cause great disasters; the people will be struck by
lightning or killed by tigers, the women will die in child-bed, and so
forth. The guilty couple are taken by their clansmen to a priest and
obliged to sacrifice a pig and a goat; after that they are made
outcasts, for their offence is inexpiable.46.1 The Orang Glai, a savage
tribe in the mountains of Annam, similarly suppose that illicit love is
punished by tigers, which devour the sinners. If a girl is found with
child, her family offers a feast of pigs, fowls, and wine to appease the
offended spirits.46.2
The Battas of Sumatra in like manner think that if an unmarried
woman is with child, she must be given in marriage at once, even to
a man of lower rank; for otherwise the people will
Similar views held be infested with tigers, and the crops in the fields
by the Battas of
Sumatra. will not be abundant. They also believe that the
adultery of married women causes a plague of
tigers, crocodiles, or other wild beasts. The crime of incest, in their
opinion, would blast the whole harvest, if the wrong were not
speedily repaired. Epidemics and other calamities that affect the
whole people are almost always traced by them to incest, by which is
to be understood any marriage that conflicts with their customs.46.3
The natives of Nias, an island to the west of Sumatra, imagine that
heavy rains are caused by the tears of a god weeping at the
commission of adultery or fornication. The punishment for these
crimes is death. The two delinquents, man and woman, are buried in
a narrow grave with only their heads projecting above ground; then
their throats are stabbed with a spear or cut with a knife, and the
grave is filled up. Sometimes, it is said, they are buried alive.
However, the judges are not always incorruptible and the injured
family not always inaccessible to the allurement of gain; and
pecuniary compensation is sometimes accepted as a sufficient salve
for wounded honour. But if the wronged man is a chief, the culprits
must surely die. As a consequence, perhaps, of this severity, the
crimes of adultery and fornication are said to be far less frequent in
Nias than in Europe.47.1
Similar views prevail among many tribes in
Similar views Borneo. Thus in regard to the Sea Dyaks we are
among the tribes of
Borneo. told by Archdeacon Perham that “immorality
among the unmarried is supposed to bring a
plague of rain upon the earth, as a punishment inflicted by Petara. It
must be atoned for with sacrifice and fine. In a
Excessive rains function which is sometimes held to procure fine
thought by the
Dyaks to be caused weather, the excessive rain is represented as the
by sexual offences. result of the immorality of two young people.
Petara is invoked, the offenders are banished from
their home, and the bad weather is said to cease. Every district
traversed by an adulterer is believed to be accursed of the gods until
the proper sacrifice has been offered.”47.2 When rain pours down day
after day and the crops are rotting in the fields, these Dyaks come to
the conclusion that some people have been secretly indulging in
lusts of the flesh; so the elders lay their heads together and
adjudicate on all cases of incest and bigamy, and purify the earth
with the blood of pigs, which appears to these
Blood of pigs shed savages, as sheep’s blood appeared to the
to expiate incest
and unchastity. ancient Hebrews, to possess the valuable property
of atoning for moral guilt. Not long ago the
offenders, whose lewdness had thus brought the whole country into
danger, would have been punished with death or at least slavery. A
Dyak may not marry his first cousin unless he first performs a special
ceremony called bergaput to avert evil consequences from the land.
The couple repair to the water-side, fill a small pitcher with their
personal ornaments, and sink it in the river; or instead of a jar they
fling a chopper and a plate into the water. A pig is then sacrificed on
the bank, and its carcase, drained of blood, is thrown in after the jar.
Next the pair are pushed into the water by their friends and ordered
to bathe together. Lastly, a joint of bamboo is filled with pig’s blood,
and the couple perambulate the country and the villages round
about, sprinkling the blood on the ground. After that they are free to
marry. This is done, we are told, for the sake of the whole country, in
order that the rice may not be blasted by the marriage of cousins.48.1
Again, we are informed that the Sibuyaus, a Dyak tribe of Sarawak,
are very careful of the honour of their daughters, because they
imagine that if an unmarried girl is found to be with child it is
offensive to the higher powers, who, instead of always chastising the
culprits, punish the tribe by visiting its members with misfortunes.
Hence when such a crime is detected they fine the lovers and
sacrifice a pig to appease the angry powers and to avert the
sickness or other calamities that might follow. Further, they inflict
fines on the families of the couple for any severe accident or death
by drowning that may have happened at any time within a month
before the religious atonement was made; for they regard the
families of the culprits as responsible for these mishaps. The fines
imposed for serious or fatal accidents are heavy; for simple wounds
they are lighter. With the fear of these fines before their eyes parents
keep a watchful eye on the conduct of their daughters. Among the
Dyaks of the Batang Lupar river the chastity of the unmarried girls is
not so strictly guarded; but in respectable families, when a daughter
proves frail, they sacrifice a pig and sprinkle its blood on the doors to
wash away the sin.48.2 The Hill Dyaks of Borneo abhor incest and do
not allow the marriage even of cousins. In 1846 the Baddat Dyaks
complained to Mr. Hugh Low that one of their chiefs had disturbed
the peace and prosperity of the village by marrying his own
granddaughter. Since that disastrous event, they said, no bright day
had blessed their territory; rain and darkness alone prevailed, and
unless the plague-spot were removed, the tribe would soon be
ruined. The old sinner was degraded from office, but apparently
allowed to retain his wife; and the domestic brawls between this ill-
assorted couple gave much pain to the virtuous villagers.49.1
Among the pagan tribes of Borneo in general,
Incest punished but of Sarawak in particular, “almost all offences
with death by the
pagan tribes of are punished by fines only. Of the few offences
Borneo. which are felt to require a heavier punishment, the
one most seriously regarded is incest. For this
offence, which is held to bring grave peril to the whole house,
especially the danger of starvation through failure of the padi crop,
two punishments have been customary. If the guilt of the culprits is
perfectly clear, they are taken to some open spot on the river-bank at
some distance from the house. There they are thrown together upon
the ground and a sharpened bamboo stake is driven through their
bodies, so that they remain pinned to the earth. The bamboo, taking
root and growing luxuriantly on this spot, remains as a warning to all
who pass by; and, needless to say, the spot is looked on with horror
and shunned by all men. The other method of punishment is to shut
up the offenders in a strong wicker cage and to throw them into the
river. This method is resorted to as a substitute for the former one,
owing to the difficulty of getting any one to play the part of
executioner and to drive in the stake, for this involves the shedding
of the blood of the community. The kind of incest most commonly
committed is the connection of a man with an adopted daughter, and
(possibly on account of this frequency) this is the kind which is most
strongly reprobated.… The punishment of the incestuous couple
does not suffice to ward off the danger brought by them upon the
community. The household must be purified with the blood of pigs
and fowls; the animals used are the property of the offenders or of
their family; and in this way a fine is imposed. When any calamity
threatens or falls upon a house, especially a great rising of the river
which threatens to sweep away the house or the tombs of the
household, the Kayans are led to suspect that incestuous
intercourse in their own or in neighbouring houses has taken place;
and they look round for evidences of it, and sometimes detect a case
which otherwise would have remained hidden. It seems probable
that there is some intimate relation between this belief and the
second of the two modes of punishment described above; but we
have no direct evidence of such connection. All the other peoples
also, except the Punans, punish incest with death. Among the Sea
Dyaks the most common form of incest is that between a youth and
his aunt, and this is regarded at least as seriously as any other
form.”50.1
Nor is it the heinous crime of incest alone which
Evil and confusion in the opinion of the Sea Dyaks endangers the
supposed by the
Dyaks to be whole community. The same effect is supposed to
wrought by follow whenever an unmarried woman is found
fornication. with child and cannot or will not name her seducer.
“The greatest disgrace,” we are told, “is attached
to a woman found in a state of pregnancy, without being able to
name her husband; and cases of self-poisoning, to avoid the shame,
are not of unusual occurrence. If one be found in this state, a fine
must be paid of pigs and other things. Few even of the chiefs will
come forward without incurring considerable responsibility. A pig is
killed, which nominally becomes the father, for want, it is supposed,
of another and better one. Then the surrounding neighbours have to
be furnished with a share of the fine to banish the Jabu, which exists
after such an event. If the fine be not forthcoming, the woman dare
not move out of her room, for fear of being molested, as she is
supposed to have brought evil (kudi) and confusion upon the
inhabitants and their belongings.”50.2
The foregoing accounts refer especially to the
Similar beliefs and tribes of Borneo under British rule; but similar
customs among the
tribes of Dutch ideas and customs prevail among the kindred
Borneo. tribes of Dutch Borneo. Thus the Kayans or
Bahaus in the interior of the island believe that adultery is punished
by the spirits, who visit the whole tribe with failure of the crops and
other misfortunes. Hence in order to avert these evil consequences
from the innocent members of the tribe, the two culprits, with all their
possessions, are first placed on a gravel bank in the middle of the
river, in order to isolate or, in electrical language, to insulate them
and so prevent the moral or rather physical infection from spreading.
Then pigs and fowls are killed, and with the blood priestesses smear
the property of the guilty pair in order to disinfect it. Finally, the two
are placed on a raft, with sixteen eggs, and allowed to drift down
stream. They may save themselves by plunging into the water and
swimming ashore; but this is perhaps a mitigation of an older
sentence of death by drowning, for young people still shower long
grass stalks, representing spears, at the shamefaced and dripping
couple.51.1 Certain it is, that some Dyak tribes used to punish incest
by fastening the man and woman in separate baskets laden with
stones and drowning them in the river. By incest they understood the
cohabitation of parents with children, of brothers with sisters, and of
uncles and aunts with nieces and nephews. A Dutch resident had
much difficulty in saving the life of an uncle and niece who had
married each other; finally he procured their banishment to a distant
part of Borneo.51.2 The Blu-u Kayans, another tribe in the interior of
Borneo, believe that an intrigue between an unmarried pair is
punished by the spirits with failure of the harvest, of the fishing, and
of the hunt. Hence the delinquents have to appease the wrath of the
spirits by sacrificing a pig and a certain quantity of rice.51.3 In Pasir, a
district of Eastern Borneo, incest is thought to bring dearth,
epidemics, and all sorts of evils on the land.51.4 In the island of
Ceram a man convicted of unchastity has to smear every house in
the village with the blood of a pig and a fowl: this is supposed to wipe
out his guilt and ward off misfortunes from the village.51.5
When the harvest fails in Southern Celebes, the
Failure of the crops Macassars and Bugineese regard it as a sure sign
and other disasters
thought to be that incest has been committed and that the spirits
caused by incest in are angry. In the years 1877 and 1878 it happened
Celebes. that the west monsoon did not blow and that the
rice crop in consequence came to nothing; moreover many buffaloes
died of a murrain. At the same time there was in the gaol at Takalar a
prisoner, who had been formerly accused of incest. Some of the
people of his district begged the Dutch governor to give the criminal
up to them, for according to the general opinion the plagues would
never cease till the guilty man had received the punishment he
deserved. All the governor’s powers of persuasion were needed to
induce the petitioners to return quietly to their villages; and when the
prisoner, having served his time, was released shortly afterwards, he
was, at his own request, given an opportunity of sailing away to
another land, as he no longer felt safe in his own country.52.1 Even
when the incestuous couple has been brought to
Disastrous effects justice, their blood may not be shed; for the people
supposed to follow
from shedding the think that, were the ground to be polluted by the
blood of incestuous blood of such criminals, the rivers would dry up
couples on the and the supply of fish would run short, the harvest
ground.
and the produce of the gardens would miscarry,
edible fruits would fail, sickness would be rife among cattle and
horses, civil strife would break out, and the country would suffer from
other widespread calamities. Hence the punishment of the guilty is
such as to avoid the spilling of their blood: usually they are tied up in
a sack and thrown into the sea to drown. Yet they get on their
journey to eternity the necessary provisions, consisting of a bag of
rice, salt, dried fish, coco-nuts, and other things, among which three
quids of betel are not forgotten.52.2 We can now perhaps understand
why the Romans used to sew up a parricide in a sack with a dog, a
cock, a viper, and an ape for company, and fling him into the sea.
They probably feared to defile the soil of Italy by spilling upon it the
blood of such a miscreant.52.3 Amongst the Tomori of Central
Celebes a person guilty of incest is throttled; no drop of his blood
may fall on the ground, for if it did, the rice would never grow again.
The union of uncle with niece is regarded by these people as incest,
but it can be expiated by an offering. A garment of the man and one
of the woman are laid on a copper vessel; the blood of a sacrificed
animal, either a goat or a fowl, is allowed to drip on the garments,
and then the vessel with its contents is set floating down the river.53.1
Among the Tololaki, another tribe of Central Celebes, persons who
have defiled themselves with incest are shut up in a basket and
drowned. No drop of their blood may be spilt on the ground, for that
would hinder the earth from ever bearing fruit again.53.2 Among the
Bare’e-speaking Toradjas of Central Celebes in general the penalty
for incest, that is for the sexual intercourse of parents with children or
of brothers with sisters, is death. But whereas the death-sentence for
adultery is executed with a spear or a sword, the death-sentence for
incest is usually executed among the inland tribes by clubbing or
throttling; for were the blood of the culprits to drip on the ground, the
earth would be rendered barren. The people on the coast put the
guilty pair in a basket, weight it with stones, and fling it into the sea.
This prescribed manner of putting the incestuous to death, we are
informed, makes the execution very grievous. However, the writers
who furnish us with these particulars and who have lived among the
people on terms of intimacy for many years, add that “incest seldom
occurs, or rather the cases that come to light are very few.”53.3 In
some districts of Central Celebes, the marriage of cousins, provided
they are children of two sisters, is forbidden under pain of death; the
people think that such an alliance would anger the spirits, and that
the rice and maize harvests would fail. Strictly speaking, two such
cousins who have committed the offence should be tied together,
weighted with stones, and thrown into water to drown. In practice,
however, the culprits are spared and their sin expiated by shedding
the blood of a buffalo or a goat. The blood is mixed with water and
sprinkled on the rice-fields or poured on the maize-fields, no doubt in
order to appease the angry spirits and restore its fertility to the tilled
land. The natives of these districts believe that were a brother and
sister to commit incest, the ground on which the tribe dwells would
be swallowed up. If such a crime takes place, the guilty pair are tied
together, their feet weighted with stones, and thrown into the sea.54.1
When it rains in torrents, the Galelareese of
Excessive rains, Halmahera, another large East Indian island, say
earthquakes, and
volcanic eruptions that brother and sister, or father and daughter, or
supposed to be in short some near kinsfolk are having illicit
produced by incest relations with each other, and that every human
in Halmahera.
being must be informed of it, for then only will the
rain cease to descend. The superstition has repeatedly caused blood
relations to be accused, rightly or wrongly, of incest. Further, the
people think that alarming natural phenomena, such as a violent
earthquake or the eruption of a volcano, are caused by crimes of the
same sort. Persons charged with such offences are brought to
Ternate; it is said that formerly they were often drowned on the way
or, on being haled thither, were condemned to be thrown into the
volcano.54.2 In the Banggai Archipelago, to the east of Celebes,
earthquakes are explained as punishments inflicted by evil spirits for
indulgence in illicit love.54.3
In some parts of Africa, also, it is believed that
Breaches of sexual breaches of sexual morality disturb the course of
morality thought to
blight the fruits of nature, particularly by blighting the fruits of the
the earth and earth; and probably such views are much more
otherwise disturb widely diffused in that continent than the scanty
the course of nature
in Africa. and fragmentary evidence at our disposal might
lead us to suppose. Thus, the negroes of Loango,
in West Africa, imagine that the commerce of a man with an
immature girl is punished by God with drought and consequent
famine until the transgressors expiate their transgression by dancing
naked before the king and an assembly of the people, who throw hot
gravel and bits of glass at the pair as they run the gauntlet. The rains
in that country should fall in September, but in 1898 there was a long
drought, and when the month of December had nearly passed, the
sun-scorched stocks of the fruitless Indian corn shook their rustling
leaves in the wind, the beans lay shrivelled and black on the ruddy
soil, and the shoots of the sweet potato had flowered and withered
long ago. The people cried out against their rulers for neglecting their
duty to the primeval powers of the earth; the priests of the sacred
groves had recourse to divination and discovered that God was
angry with the land on account of the immorality of certain persons
unknown, who were not observing the traditions and laws of their
God and country. The feeble old king had fled, but the slave who
acted as regent in his room sent word to the chiefs that there were
people in their towns who were the cause of God’s wrath. So every
chief called his subjects together and caused enquiries to be made,
and then it was discovered that three girls had broken the customs of
their country; for they were with child before they had passed
through what is called the paint-house, that is, before they had been
painted red and secluded for a season in token that they had
attained to the age of puberty. The people were incensed and
endeavoured to punish or even kill the three girls; and the English
writer who has recorded the case has thought it worth while to add
that on the very morning when the culprits were brought before the
magistrate rain fell.55.1 Amongst the Bavili of Loango, who are
divided into totemic clans, no man is allowed to marry a woman of
his mother’s clan; and God is believed to punish a breach of this
marriage law by withholding the rains in their due season.56.1 Similar
notions of the blighting influence of sexual crime appear to be
entertained by the Nandi of British East Africa; for we are told that
when a warrior has got a girl with child, she “is punished by being put
in Coventry, none of her girl friends being allowed to speak to or look
at her until after the child is born and buried. She
Sexual purity is also regarded with contempt for the rest of her
required of those
who handle corn or life and may never look inside a granary for fear of
enter a granary. spoiling the corn.”56.2 Among the Basutos in like
manner “while the corn is exposed to view, all
defiled persons are carefully kept from it. If the aid of a man in this
state is necessary for carrying home the harvest, he remains at
some distance while the sacks are filled, and only approaches to
place them upon the draught oxen. He withdraws as soon as the
load is deposited at the dwelling, and under no pretext can he assist
in pouring the corn into the basket in which it is preserved.”56.3 The
nature of the defilement which thus disqualifies a man from handling
the corn is not mentioned, but we may conjecture that unchastity
would fall under this general head. For amongst the Basutos after a
child is born a fresh fire has to be kindled in the dwelling by the
friction of wood, and this must be done by a young man of chaste
habits; it is believed that an untimely death awaits him who should
dare to discharge this holy office after having lost his innocence.56.4
In Morocco whoever enters a granary must first remove his slippers
and must be sexually clean. Were an unclean person to enter, the
people believe not only that the grain would lose its blessed
influence (baraka), but that he himself would fall ill. A Berber told Dr.

You might also like