Feeds

Celebs join call for official Turing apology

Fight for posthumous justice

SANS - Survey on application security programs

Celebrities including writer Ian McEwan and evolutionary biologist Richard Dawkins have signed a petition calling for a posthumous government apology to computing pioneer and wartime code-breaker Alan Turing.

A Downing Street petition calling for an apology for the "prosecution of Alan Turing that led to his untimely death" has attracted more than 17,000 signatures.

Turing was denied clearance to work on classified work for GCHQ after he admitted a homosexual relationship and was convicted of gross indecency in 1952. Forced to take an experimental chemical castration treatment to avoid prison, Turing spiralled into depression and committed suicide two years later in 1954, aged just 41.

After leading a team of code-breakers at Bletchley Park during WWII, helping to create the Bombe that automated the process of decrypting messages encoded using the German Enigma machines, Turing went on to lay the foundations for modern computer science. For example, he helped design the Manchester Mark 1, one of the first computers.

John Graham-Cumming, the British computer scientist who started the campaign, has also asked the Queen to give Turing a posthumous knighthood. Turing has no surviving family.

Graham-Cumming admits that a government apology is "unlikely", but said that anything that contributes to greater public recognition of Turing's work and that highlights the injustice he faced is worthwhile.

"The most important thing to me is that people hear about Alan Turing and realise his incredible impact on the modern world, and how terrible the impact of prejudice was on him," Graham-Cumming told the BBC.

British scientists such as Charles Darwin and Isaac Newton appear on the back of Bank of England notes, and we can't help thinking that Turing's contribution to defeating the Nazis and computing might be more properly marked by having his portrait appear on the back of a note next time they are redesigned. Such a move would also recognise the contribution of all at Bletchley Park to the war effort. ®

3 Big data security analytics techniques

More from The Register

next story
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
APPLE FAILS to ditch class action suit over ebook PRICE-FIX fiasco
Do not pass go, do cough (up to) $840m in damages
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.