Computing-as-interaction

In its brief history, computer science has enjoyed several different metaphors for the notion of computation.  From the time of Charles Babbage in the nineteenth century until the mid-1960s, most people thought of computation as calculation, or the manipulation of numbers.  Indeed, the English word “computer” was originally used to describe a person undertaking arithmetical calculations.  With widespread digital storage and processing of non-numerical information from the 1960s onwards, computation was re-conceptualized more generally as information processing, or the manipulation of numerical-, text-, audio- or video-data.  This metaphor is probably still the prevailing view among people who are not computer scientists.  From the late 1970s, with the development of various forms of machine intelligence, such as expert systems, a yet more general metaphor of computation as cognition, or the manipulation of ideas, became widespread, at least among computer scientists.  The fruits of this metaphor have been realized, for example, in the advanced artificial intelligence technologies which have now been a standard part of desktop computer operating systems since the mid-1990s.  Windows95, for example, included a Bayesnet for automated diagnosis of printer faults.
With the growth of the Internet and the Web over the last two decades, we have reached a position where a new metaphor for computation is required:  computation as interaction, or the joint manipulation of ideas and actions. In this metaphor, computation is something which happens by and through the communications which computational entities have with one another.  Cognition and intelligent behaviour is not something which a computer does on its own, or not merely that, but is something which arises through its interactions with other intelligent computers to which is connected.  The network is the computer, in SUN’s famous phrase.  This viewpoint is a radical reconceptualization of the notion of computation.
coveral3roadmap
In this new metaphor, computation is an activity which is inherently social, rather than solitary, and this view leads to a new ways of conceiving, designing, developing and managing computational systems.  One example of the influence of this viewpoint, is the model of software as a service, for example in Service Oriented Architectures.  In this model, applications are no longer “compiled together” in order to function on one machine (single user applications), or distributed applications managed by a single organization (such as most of today’s Intranet applications), but instead are societies of components:

  • These components are viewed as providing services to one another rather than being compiled together.  They may not all have been designed together or even by the same software development team; they may be created, operate and de-commissioned according to different timescales; they may enter and leave different societies at different times and for different reasons; and they may form coalitions or virtual organizations with one another to achieve particular temporary objectives.  Examples are automated procurement systems comprising all the companies connected along a supply chain, or service creation and service delivery platforms for dynamic provision of value-added telecommunications services.
  • The components and their services may be owned and managed by different organizations, and thus have access to different information sources, have different objectives, have conflicting preferences, and be subject to different policies or regulations regarding information collection, storage and dissemination.  Health care management systems spanning multiple hospitals or automated resource allocation systems, such as Grid systems, are examples here.
  • The components are not necessarily activated by human users but may also carry out actions in an automated and co-ordinated manner when certain conditions hold true.  These pre-conditions may themselves be distributed across components, so that action by one component requires prior co-ordination and agreement with other components.  Simple multi-party database commit protocols are examples of this, but significantly more complex co-ordination and negotiation protocols have been studied and deployed, for example in utility computing systems and in ad hoc wireless networks.
  • Intelligent, automated components may even undertake self-assembly of software and systems, to enable adaptation or response to changing external or internal circumstances.  An example is the creation of on-the-fly coalitions in automated supply-chain systems in order to exploit dynamic commercial opportunities.  Such systems resemble those of the natural world and human societies much more than they do the example arithmetical calculations  programs typically taught in Fortran classes, and so ideas from biology, ecology, statistical physics, sociology, and economics play an increasingly important role in computer science.

How should we exploit this new metaphor of computation as a social activity, as interaction between intelligent and independent entities, adapting and co-evolving with one another?  The answer, many people believe, lies with agent technologies.  An agent is a computer programme capable of flexible and autonomous action in a dynamic environment, usually an environment containing other agents.  In this abstraction, we have software entities called agents, encapsulated, autonomous and intelligent, and we have demarcated the society in which they operate, a multi-agent system.  Agent-based computing concerns the theoretical and practical working through of the details of this simple two-level abstraction.
Reference:
Text edited slightly from the Executive Summary of:
M. Luck, P. McBurney, S. Willmott and O. Shehory [2005]: The AgentLink III Agent Technology Roadmap. AgentLink III, the European Co-ordination Action for Agent-Based Computing, Southampton, UK.

Social forecasting: Doppio Software

Five years ago, back in the antediluvian era of Web 2.0 (the web as enabler and facilitator of social networks), we had the idea of  social-network forecasting.  We developed a product to enable a group of people to share and aggregate their forecasts of something, via the web.  Because reducing greenhouse gases were also becoming flavour-du-jour, we applied these ideas to social forecasts of the price for the European Union’s carbon emission permits, in a nifty product we called Prophets-360.  Sadly, due mainly to poor regulatory design of the European carbon emission market, supply greatly outstripped demand for emissions permits, and the price of permits fell quickly and has mostly stayed fallen.  A flat curve is not difficult to predict, and certainly there was little value in comparing one person’s forecast with that of another.  Our venture was also felled.

But now the second generation of social networking forecasting tools has arrived.  I see that a French start-up, Doppio Software, has recently launched publicly.   They appear to have a product which has several advantages over ours:

  • Doppio Software is focused on forecasting demand along a supply chain.  This means the forecasting objective is very tactical, not the long-term strategic forecasting that CO2 emission permit prices became.   In the present economic climate, short-term tactical success is certainly more compelling to business customers than even looking five years hence.
  • The relevant social network for a supply chain is a much stronger community of interest than the amorphous groups we had in mind for Prophets-360.  Firstly, this community already exists (for each chain), and does not need to be created.  Secondly, the members of the community by definition have differential access to information, on the basis of their different positions up and down the chain.  Thirdly, although the interests of the partners in a supply chain are not identical, these interests are mutually-reinforcing:  everyone in the chain benefits if the chain itself is more successful at forecasting throughput.
  • In addition, Team Doppio (the Doppiogangers?) appear to have included a very compelling value-add:  their own automated modeling of causal relationships between the target demand variables of each client and general macro-economic variables, using  semantic-web data and qualitative modeling technologies from AI.  Only the largest manufacturing companies can afford their own econometricians, and such people will normally only be able to hand-craft models for the most important variables.  There are few companies IMO who would not benefit from Doppio’s offer here.

Of course, I’ve not seen the Doppio interface and a lot will hinge on its ease-of-use (as with all software aimed at business users).  But this offer appears to be very sophisticated, well-crafted and compelling, combining social network forecasting, intelligent causal modeling and semantic web technologies.

Well done, Team Doppio!  I wish you every success with this product!

PS:  I have just learnt that “doppio” means “double”, which makes it a very apposite name for this application – forecasts considered by many people, across their human network.  Neat!  (2009-09-16)

Article in The Observer (UK) about Doppio 2009-09-06 here. And here is an AFP TV news story (2009-09-15) about Doppio co-founder, Edouard d’Archimbaud.  Another co-founder is Benjamin Haycraft.

Action-at-a-distance

For at least 22 years, I have heard business presentations (ie, not just technical presentations) given by IT companies which mention client-server architectures.   For the last 17 of those years, this is not suprising, since both the Hyper-Text Transfer Protocol (HTTP) and the World-Wide Web (WWW) use this architecture.    In a client-server architecture, one machine (the client) requests that some action be taken by another machine (the server), which responds to the request.  For HTTP, the standard request by the client is for the server to send to the client some electronic file, such as a web-page.  The response by the server is not necessarily to undertake the action requested.    Indeed, the specifications of HTTP define 41 responses (so-called status codes), including outright refusal by the server (Client Error 403 “Forbidden”), and allow for hundreds more to be defined.  Typically, one server will be configured to respond to many simultaneous or near-simultaneous client requests.   The functions of client and server are conceptually quite distinct, although of course, one machine may undertake both functions, and a server may even have to make a request as a client to another server in order to respond to an earlier request from its clients.   As an analogy, consider a library which acts like a server of books to its readers, who are its clients;  a library may have to request a book via inter-library loan from another library in order to satisfy a reader’s request.
Since the rise of file sharing, particularly illegal file sharing, over a decade ago, it has also been common to hear talk about Peer-to-Peer (P2P) architectures.   Conceptually, in these architectures all machines are viewed equally, and none are especially distinguished as servers.   Here, there is no central library of books; rather, each reader him or herself owns some books and is willing to lend them to any other reader as and when needed.   Originally, peer-to-peer architectures were invented to circumvent laws on copyright, but they turn out (as do most technical innovations) to have other, more legal, uses – such as the distributed storage and sharing of electronic documents in large organizations (eg, xray images in networks of medical clinics).
Both client-server and P2P architectures involve attempts at remote control.  A client or a peer-machine makes a request of another machine (a server or another peer, respectively), to undertake some action(s) at the location of the second machine.   The second machine receiving the request from the first may or may not execute the request.   This has led me to think about models of such action-at-a-distance.
Imagine we have two agents (human or software), named A and B, at different locations, and a resource, named X, at the same location as B.   For example, X could be an electron microscope, B the local technician at site of the microscope, and  A a remote user of the microscope. Suppose further that agent B can take actions directly to control resource X.   Agent A may or may not have permissions or powers to act on X.
Then,  we have the following five possible situations:

1.  Agent A controls X directly, without agent B’s involvement (ie, A has remote access to and remote control over resource X).
2.  Agent A commands agent B to control X (ie, A and B have a master-slave relationship; some client-server relationships would fall into this category).
3.  Agent A requests agent B to control X (ie, both A and B are autonomous agents; P2P would be in this category, as well as many client-server interactions).
4.  Both agent A and agent B need to take actions jointly to control X (eg, the double-key system for launch of nuclear missiles in most nuclear-armed forces; coalitions of agents would be in this category)
5.  Agent A has no powers, not direct nor indirect, to control resource X.

As far as I can tell, these five situations exhaust the possible relationships betwen agents A and B acting on resource X, at least for those cases where potential actions on X are initated by agent A.  From this outline, we can see the relevance of much that is now being studied in computer science:

  • Action co-ordination (Cases 1-5)
  • Command dialogs (Case 2)
  • Persuasion dialogs (Case 3)
  • Negotiation dialogs (dialogs to divide a scarce resource) (Case 4)
  • Deliberation dialogs (dialogs over what actions to take) (Cases 1-4)
  • Coalitions (Case  4).

To the best of my knowledge, there is as yet no formal theory which encompasses these five cases.   (I welcome any suggestions or comments to the contrary.)  Such a formal theory is needed as we move beyond Web 2.0 (the web as means to create and sustain social networks) to reification of the idea of computing-as-interaction (the web as a means to co-ordinate joint actions).
Reference:
Network Working Group [1999]: Hypertext Transfer Protocol – HTTP/1.1. Technical Report RFC 2616.  Internet Engineering Task Force.

Thinkers of renown

The recent death of mathematician Jim Wiegold (1934-2009), whom I once knew, has led me to ponder the nature of intellectual influence.  Written matter – initially, hand-copied books, then printed books, and now the Web – has been the main conduit of influence.   For those of us with a formal education, lectures and tutorials are another means of influence, more direct than written materials.   Yet despite these broadcast methods, we still seek out individual contact with others.  Speaking for myself, it is almost never the knowledge or facts of others, per se, that I have sought or seek in making personal contact, but rather their various different ways of looking at the world.   In mathematical terminology, the ideas that have influenced me have not been the solutions that certain people have for particular problems, but rather the methods and perspectives they use for approaching and tackling problems, even when these methods are not always successful.

To express my gratitude, I thought I would list some of the people whose ideas have influenced me, either directly through their lectures, or indirectly through their books and other writings.   In the second category, I have not included those whose ideas have come to me mediated through the books or lectures of others, which therefore excludes many mathematicians whose work has influenced me (in particular:  Newton, Leibniz, Cauchy, Weierstrauss, Cantor, Frege, Poincare, Pieri, Hilbert, Lebesque, Kolmogorov, and Godel).  I have also not included the many writers of poetry, fiction, history and biography whose work has had great impact on me.  These two categories also exclude people whose intellectual influence has been manifest in non-verbal forms, such as through visual arts or music, or via working together, since those categories need posts of their own.

Teachers & lecturers I have had who have influenced my thinking includeLeo Birsen (1902-1992), Sr. Claver Butler RSM (ca. 1930-2009), Burgess Cameron (1922-2020), Sr. Clare Castle RSM (ca. 1920- ca. 2000), John Coates (1945-2022), Dot Crowe, James Cutt, Bro. Clive Davis FMS, Tom Donaldson (1945-2006), Gary Dunbier, Sol Encel (1925-2010), Felix Fabryczny de Leiris, Claudio Forcada, Richard Gill (1941-2018), Myrtle Hanley (1909-1984), Sr. Jennifer Hartley RSM, Chip Heathcote (1931-2016),  Hope Hewitt (1915-2011), Alec Hope (1907-2000),  John Hutchinson, Marg Keetles, Joe Lynch, Robert Marks, John McBurney (1932-1998), David Midgley, Lindsay Morley, Leopoldo Mugnai, Terry O’Neill, Jim Penberthy* (1917-1999), Malcolm Rennie (1940-1980), John Roberts, Gisela Soares, Brian Stacey (1946-1996), James Taylor, Frank Torpie (1934-1989),  Neil Trudinger, David Urquhart-Jones, Frederick Wedd (1890-1972), Gary Whale (1943-2019), Ted Wheelwright (1921-2007), John Woods and Alkiviadis Zalavras.

People whose writings have influenced my thinking includeJohn Baez, Ole Barndorff-Nielsen (1935-2022), Charlotte Joko Beck (1917-2011), Johan van Bentham, Mark Evan Bonds, John Cage (1912-1992), Albert Camus (1913-1960), Nikolai Chentsov (1930-1992), John Miller Chernoff, Stewart Copeland, Sam Eilenberg (1913-1998), Paul Feyerabend (1924-1994), George Fowler (1929-2000), Kyle Gann, Alfred Gell (1945-1997), Herb Gintis, Jurgen Habermas, Charles Hamblin (1922-1985), Vaclav Havel (1936-2011), Lafcadio Hearn (1850-1904), Jaakko Hintikka (1929-2015), Eric von Hippel, Wilfrid Hodges, Christmas Humphreys (1901-1983), Jon Kabat-Zinn, Herman Kahn (1922-1983), John Maynard Keynes (1883-1946), Andrey Kolmogorov (1903-1987), Paul Krugman, Imre Lakatos (1922-1974), Trevor Leggett (1914-2000), George Leonard (1923-2010), Brad de Long, Donald MacKenzie,  Saunders Mac Lane (1909-2005), Karl Marx (1818-1883), Grant McCracken, Henry Mintzberg, Philip Mirowski, Michel de Montaigne (1533-1592), Michael Porter, Charles Reich (1928-2019), Jean-Francois Revel (1924-2006), Daniel Rose, Bertrand Russell (1872-1970), Pierre Ryckmans (aka Simon Leys) (1935-2014), Oliver Sacks (1933-2015), Gunther Schuller (1925-2015), George Shackle (1903-1992), Cosma Shalizi, Rupert Sheldrake, Raymond Smullyan (1919-2017), Rory Stewart, Anne Sweeney (d. 2007), Nassim Taleb, Henry David Thoreau (1817-1862), Stephen Toulmin (1922-2009), Scott Turner, Roy Weintraub, Geoffrey Vickers VC (1894-1982), and Richard Wilson.

FOOTNOTES:
* Which makes me a grand-pupil of Nadia Boulanger (1887-1979).
** Of course, this being the World-Wide-Web, I need to explicitly say that nothing in what I have written here should be taken to mean that I agree with anything in particular which any of the people mentioned here have said or written.
A more complete list of teachers is here.

Sharks and murder: a Sydney story

Any aspiring crime novelists among you may relish the details of this report from tomorrow’s Sydney Morning Herald:

No wonder the Shark Arm Murder of 1935 remains Sydney’s best-known homicide. Apart from combining two of the city’s enduring interests, crime and sharks, the dismemberment of Jim Smith and its aftermath involved an unusually large number of suburbs, providing plenty of local colour.
. . .
For those uninitiated in the detail of the Shark Arm Murder, Jim Smith, a knockabout and police informer, was killed in Cronulla in a cottage called Cored Joy. According to Alex Castles’s book, most of his body was probably given a ”Sydney send-off” and dumped at sea.
But the arm itself , once detached, seems to have been taken by killer Patrick Brady on a journey to the McMahons Point residence of one Reginald Holmes, a pillar of the local Presbyterian church and cocaine smuggler. After the meeting with Holmes, Brady took the arm to Maroubra, and threw it into the ocean. It was eaten by a small shark that was then consumed by a four-metre tiger shark, which was caught and exhibited alive in a pool at the Coogee Aquarium Baths (now the Beach Palace Hotel). When the shark vomited the arm before a fascinated crowd on Anzac Day, police from Randwick and the city were called. During the investigation, Holmes, who ran his business from Lavender Bay, got into a motorboat, consumed a lot of brandy, and tried unsuccessfully to shoot himself. He then led the police on a four-hour chase around the harbour.
On the morning of the inquest into Smith’s death, Holmes was found dead in the driver’s seat of his Nash sedan in The Rocks, with three gunshot wounds in his chest. No one was convicted of the deaths of Smith or Holmes.”

Against the macho-securocrats

Andrew Sullivan on torture expresses my views exactly.  Richard B. Cheney and that egregious horseman of the apocalypse, John Bolton, keep making the macho-security argument – that only brute force and brutal methods will guarantee the West’s security.  Not only are such means ineffective and counter-productive, their very immorality vitiates our ends.   Just what western values, precisely, could be defended with torture and arbitrary arrest and detention?  That we inflict cruel and unusual punishments, in secret, on our perceived enemies?  That we treat even innocent people as less than human?  That we think laws and due process are dispensible?   Just whose western values are these?
The macho-security argument needs to be forcefully countered every time it is made, as Andrew Sullivan does here:

Actually, I can [believe that America is now safer because of the new restrictions on torture]. I think the intelligence we now get will be much more reliable; I believe that torture recruited thousands of Jihadists; I believe holding torturers accountable will help restore our alliances and give moral integrity back to the war on terror; I believe that without torture, we may actually be able to bring terrorists to justice; and that restoring America’s moral standing will make the war of ideas against Jihadism more winnable and therefore the West less vulnerable than it is now.”

Recent listening 2: Johann Vanhal

Because Joseph Haydn died in 1809, there have been many celebrations of his music this year.  Even Cottonopolis held a mini-fest of his symphonies earlier in the summer.   For a very long time, I did not enjoy Haydn’s symphonies, hearing them as light-weight, shallow and frivolous.  The musical jokes were mildly amusing the first time you hear them, but are not amusing after repeated exposure.  Rather, in marked contrast to his sacred music, Haydn’s symphonic music struck me most forcefully as twee. Perhaps there was something in the social circumstances of their commissioning or their performance that precluded the intense and the profound being expressed in his symphonies.  El Papa’s symphonies have a flippancy one can also hear in lots of Mozart (excepting inter alia his last four Symphonies), in Beethoven (when he’s not being self-consciously serious), and stretching, in what seems to me became a peculiarly-Viennese tradition, all the way to the waltzing Strauss family and even to Mahler.  With the Strausses, it is all foam, all the time.   This Viennese flippancy virus even infected composers far away, such as Mahler’s great admirer, Shostakovich, whose Concerto for Piano and Trumpet (for example) is one long musical joke.   Perhaps only in a city surrounding an imperial court could music so frivolous, so lacking in gravitas, be desired, written or admired.
However, by chance a few years ago, I heard one of Haydn’s so-called Sturm-und-Drang (Storm and Stress) Symphonies.  Here at last was the serious Hadyn I knew from the oratorios and the chamber music, writing music which expressed deeply-felt emotions, and which evoked them, and did both intensely.    These symphonies from his middle period, written between 1768 and 1772 when he was in his late 30s, and usually counted as numbers 44-49, are more powerful and intense than his other symphonies, in my opinion.  In comparison to the music of the practical jokester, they are strange and difficult.  They were clearly written by someone experiencing some emotional torment, and they make for uncomfortable listening.

Recently, I heard a radio broadcast of a symphony which at first I thought was another Haydn sturm-und-drang work, but which I did not know. It turned out to be a work by one of Haydn’s contemporaries, Johann Baptist Vanhal (1739-1813), a Czech composer who lived mostly in Vienna from 1760.   I have since listened to all his works I can find recorded.   Here is music to be reckoned with – deeply intense, emotional, profound, technically sophisticated, and much better than Haydn’s best symphonies.   Technically, Vanhal strikes me as more adept than Haydn, innovative in his choice of instrumentation, and approaching the level of Beethoven in his manipulation and development of musical ideas to achieve profound and moving effects.   The thrilling opening of Symphony bryan c2 (the second in c minor in the numbering system of Paul Bryan) is surely one of the most exciting of the whole 18th century, sending the hairs on my neck straight up.   And the theme is then developed to a place of intense sadness and feeling.  The final movement of this symphony is also quite thrilling, with fast, high string figures repeated while the harmonies beneath them move.    Similarly, Vanhal uses a moving bass line to add a profound edge to a somewhat frivolous melody line in the third movement (Allegro) of Symphony bryan D4 (the fourth in D major).    The fourth movement of Symphony bryan d1 is also intense and thrilling.
In the 4th movement of Symphony bryan g2, Vanhal uses a development idea which is often found in Bach – a figure is played three times, descending a tone each time, over six elements of a circle-of-fifths harmonic progression (eg,  E – A, D – G, C – F).   (To be fair, Haydn also uses similar gadgets – for example, the thrilling circle-of-fourths progression in the development section of the first movement of his Symphony #48 in C, Maria Theresa.)  Supposedly one of the pleasures we gain from listening to music comes from anticipation – our brains are continually predicting what will come next, and when it does we gain enjoyment – and hearing this figure always provides me with great pleasure.    In the intensity of his music and in the development sections, we hear also a prefigurement of Gossec and Beethoven and later symphonic composers.
Why do we not hear more of  Vanhal’s music?  Why are all his symphonies not yet recorded?  Especially in this year of Hadynolatry we should be hearing the music of his contempories and those who influenced him – Vanhal, von Dittersdorf, Michael Haydn – or vice versa, especially when they wrote better music and music which clearly influenced later composers.   If the BBC took seriously its mission to educate as well as to entertain, we could perhaps expect better.  Instead, we get to hear once again Haydn’s musical jokes, as if these were new to us, or funny.
References:
Josef Haydn:  “Sturm und Drang” Symphonies, nos. 44-49.  Symphony Orchestra of Radio Zagreb, Antonio Ianigro (conductor).  Artemis Classics, 2004.
Johann Vanhal: Symphonies.  London Mozart Players, Matthias Bamert (conductor). Chandos Records, 1998.  Contains Symphonies Bryan g2, D4 and c2.
Johann Vanhal: Symphonies. Concerto Koln (no conductor listed).  Elatus, 1996.  Contains Symphonies Bryan d1, g1, C11, a2 and e1.
Johann Vanhal: Symphonies Volume 1. Nicolaus Esterhazy Sinfonia, Uwe Grodd (conductor). Naxos, 1999. Contains Symphonies Bryan A9, C3, D17, and C11.
Johann Vanhal: Symphonies Volume 2. City of London Sinfonia, Andrew Watkinson (conductor). Naxos, 2000. Contains Symphonies Bryan Bb3, d2, and G11.
Johann Vanhal: Symphonies Volume 3. Toronto Camerata, Kevin Mallon (conductor). Naxos, 2005. Contains Symphonies Bryan D2, Ab1, c2, and G6.
Johann Vanhal: Symphonies Volume 4. Toronto Chamber Orchestra, Kevin Mallon (conductor). Naxos, 2008. Contains Symphonies Bryan e3, C17, C1, and Eb1.

Saving Kim Dae-jung

One event that always intrigued me about the life of Kim Dae-Jung was his release by the Korean CIA after their kidnap and torture of him in 1973, a release apparently forced on the Koreans by the US Government.  Such concern for the human rights of opposition dissidents in US-allied countries always struck me as very uncharacteristic of the brutal and cynical real-politic, bordering on madness,  of the Nixon-Kissinger White House, and I always wondered what prompted the concern on that particular occasion.  Now we learn from an op-ed article in the International Herald Tribune that Nixon and Kissinger knew little or nothing about the pressure their administration brought to bear on the repulsive Park regime to release Kim unharmed.  That pressure, which was intense and concerted, was the work of two brave US Government officials, State Department Korea expert Donald L. Ranard and then US Ambassador to the Republic of Korea, Philip Habib.
Reference:
Donald A. Ranard [2009-08-25]:  Saving Kim Dae-jung.  International Herald Tribune, page 6.  For reasons known only to themselves, and as further evidence of the MSM’s failure to understand the 21st century, this article appears not to be in the New York Times online archive (at least, it is not accessible via its title, its author, or any of the people mentioned in it!) 
Postscript (added 2010-08-09):  Here is the article on the site of The Boston Globe.

Guest Post: Michael Holzman on Writing Intelligence History

In response to my review of his book on the life of Jim Angleton, Michael Holzman has written a thoughtful post on the particular challenges of writing histories of secret intelligence organizations:
Histories of the activities of secret intelligence organizations form a specialized branch of historical research, similar, in many ways, to military and political history, dissimilar in other ways.  They are similar in that the object of study is almost always a governmental institution and like the Army, for example, a secret intelligence organization may produce its own public and private histories and cooperate or not cooperate with outside historians.  They are dissimilar due to the unusual nature of secret intelligence organizations.
The diplomatic historian has at his or her disposal the vast, rich and often astonishingly frank archives of diplomacy, such as the Foreign Relations of the United States (FRUS).   Needless to say, there is no publication series entitled the Secret Foreign Operations of the United States (or any other country).  What we have instead is something like an archeological site, a site not well-preserved or well-protected, littered with fake artifacts, much missing, much mixed together and all difficult to put in context.
The overwhelming majority of publications about secret intelligence are produced by secret intelligence services as part of their operations, whether purportedly written  by “retired” members of those services, by those “close to” such services, by writers commissioned, directly or through third or fourth parties, by such services.  There are very few independent researchers working in the field.  The most distinguished practitioners, British academics, for example, have dual appointments—university chairs and status as “the historian” of secret intelligence agencies.  There are, of course, muckrakers, some of whom have achieved high status among the cognoscenti, but they are muckrakers nonetheless and as such exhibit the professional deformations of their trade, chiefly, a certain obscurity of sourcing and lack of balance in judgment.
Thus, an academically trained researcher, taking an interest in this field, finds challenges unknown elsewhere.  The archives are non-existent, “weeded,” or faked; the “literature” is tendentious to a degree not found otherwise outside of obscure religious sects; common knowledge, including fundamental matters of relative importance of persons and events, is at the very least unreliable, and research methods are themselves most peculiar.  Concerning the latter, the privileged mode is the interview with secret intelligence officials, retired secret intelligence officials, spies and so forth.  Authors and researchers will carefully enumerate how many interviews they held, sometimes for attribution, more often not, the latter instances apparently more valued than the former.  This is an unusual practice, not that researchers do not routinely interview those thought to be knowledgeable about the subject at hand, but because these particular interviewees are known to be, by definition, unreliable witnesses.  Many are themselves trained interrogators; most are accustomed to viewing their own speech as an instrument for specific operational purposes; nearly all have signed security pledges.  The methodological difficulties confronting the researcher seem to allow only a single use for the products of these interviews:  the statement that the interviewee on this occasion said this or that, quite without any meaningful application of the statements made.
An additional, unusual, barrier to research is the reaction of the ensemble of voices from the secret intelligence world to published research not emanating from that world or emanating from particular zones not favored by certain voices.  Work that can be traced to other intelligence services is discredited for that reason; work from non-intelligence sources is discredited for that reason (“professor so-and-so is unknown to experienced intelligence professionals”); certain topics are off-limits and, curiously, certain topic are de rigeur (“The writer has not mentioned the notorious case y”).   And, finally, there is the scattershot of minutiae always on hand for the purpose—dates (down to the day of the week), spelling (often transliterated by changing convention), names of secret intelligence agencies and their abbreviations (“Surely the writer realizes that before 19__ the agency in question was known as XXX”).  All this intended to drown out dissident ideas or, more importantly, inconvenient facts, non-received opinions. 
What is to be done?  One suggestion would be that of scholarly modesty.  The scholar would be well-advised to accept at the beginning that much will never be available.  Consider the ULTRA secret—the fact that the British were able to read a variety of high-grade German ciphers during the Second World War.  This was known, in one way or another, to hundreds, if not thousands, of people, and yet remained secret for most of a generation.  Are we sure that there is no other matter, as significant, not only to the history of secret intelligence, but to general history, that is not yet known?  Secondly, that which does become available must be treated with extraordinary caution in two ways:  is it what it purports to be, and how does it fit into a more general context?  To point at two highly controversial matters, there is VENONA, the decryptions and interpretations of certain Soviet diplomatic message traffic, and, on a different register, the matter of conspiracy theories.  Just to approach the prickly pear of the latter, the term itself was invented by James Angleton, chief of the CIA counterintelligence staff, as a way for discouraging questions of the conclusions of the Warren Commission.  It lives on, an undead barrier to the understanding of many incidents of the Cold War.  The VENONA material is available only in a form edited and annotated by American secret intelligence.  There are, for example, footnotes assigning certain cover names to certain well-known persons, but no reasons are given for these attributions.  The original documents have not been made available to researchers, nor the stages of decryption and interpretation. And yet great castles of interpretation have been constructed on these foundations.
Intelligence materials can be used, indeed, if available, must be used, if we are to understand certain historical situations:  the coup d’etats in Iran, Guatemala and Chile, for example.  The FRUS itself incorporates secret intelligence materials in its account of the Guatemala matter.  But such materials can only be illustrative; the case itself must be made from open sources.  There are exceptions:  Nazi-era German intelligence records were captured and are now available nearly in their entirety; occasional congressional investigations have obtained substantial amounts of the files of American secret intelligence agencies; other materials become misplaced into the public realm.  But this is a diminuendo of research excellence.  The historian concerned with secret intelligence matters must face the unpleasant reality that little can be known about such matters and, from the point of view of the reader, the more certainty with which interpretations are asserted, the more likely it is that such interpretations are yet another secret intelligence operation.
— Michael Holzman