Book a Demo!
CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutPoliciesSign UpSign In
Download
29547 views
1
2
3
4
5
6
The Enemy Within
7
8
The setting is the Clinton
9
White House--as interpreted in the movie Contact --and presidential
10
advisers have convened to discuss an extraterrestrial communication in the form
11
of an engineering diagram. The plans, says Dr. Eleanor Arroway (Jodie Foster),
12
are for "some kind of machine."
13
14
"A machine? That does what,
15
doctor?" asks a presidential aide.
16
17
"Some kind of a transport,"
18
Arroway replies.
19
20
"It could
21
be anything," counters National Security Adviser Michael Kitz (James Woods),
22
who is dubious of extraterrestrial motivations. "It could be a Trojan horse. We
23
build it, and out pours the entire Vegan army."
24
25
That isn't, in the end, what the aliens have in mind, but
26
the term Trojan horse --the durable ancestor of the expressions fifth
27
column and mole , and of the modifier stealth --has certainly
28
been enjoying a prominent vitality these days, as befits an era that values
29
frontal hostility far less than it does insidious subterfuge. "Year of the
30
Trojan Horse," proclaimed one New York Times headline the day after the
31
British Crown Colony of Hong Kong was returned to China. The familiar story of
32
the Trojan horse appears in Virgil's Aeneid : The horse, with armed men
33
hidden inside, is presented by the Greek enemy to the besieged city of Troy,
34
and brought within its walls. It immediately achieves an afterlife as metaphor
35
(in addition to yielding the admonition "beware of Greeks bearing gifts"). "The
36
central question," wrote Times correspondent Nicholas D. Kristof in his
37
Hong Kong dispatch, "is whether Hong Kong amounts to a colossal Trojan horse: a
38
prize so glorious that China's Communists cannot leave it outside the gates but
39
which, once inside, will destroy those in power" with its irrepressible example
40
of roiling capitalism and affluence, and its concentrated economic power.
41
42
43
Trojan
44
horse has found further application in recent months in the realm of
45
plastic surgery. The phrase refers to a bodily overhaul so extensive as to
46
render obsolete all superficial indications of age or identity. "I'm a Trojan
47
horse," the beneficiary of such procedures, a woman of 42, a self-described
48
member of Mensa, explained last June to a newspaper reporter, "because what you
49
see is not what you get. I may look young and bimboesque, but I am nothing of
50
the sort." Earlier this summer the alleged Mexican drug baron Amado Carrillo
51
Fuentes apparently died on the operating table while undergoing cosmetic
52
surgery of Trojan horse amplitude; law-enforcement officials needed to perform
53
forensic testing to confirm that the decedent was, in fact, Carrillo. Also in
54
the medical arena are the various kinds of Trojan horse invaders that trick
55
their way into acceptance by the body's cells, and then cause illness; and the
56
various kinds of Trojan horse countermeasures, including gene therapy and
57
vaccines.
58
59
60
The most prevalent use of Trojan horse
61
today is its cyberuse, now two decades old, where it refers to hard-to-detect
62
instructions secretly embedded in computer software, making possible various
63
kinds of unauthorized or unintended outcomes ranging from theft to breach of
64
security to self-destruction. Trojan horses, long of concern to money managers,
65
database managers, and weapons experts at the Pentagon, afflicted thousands of
66
ordinary consumers in the course of an episode concluded by the Federal Trade
67
Commission last winter. This Trojan horse, which acquired the variant name
68
Moldovan horse , quietly made users place a long-distance phone call to
69
Moldova whenever they gained access to a certain pornographic site on the
70
Internet. Consumers were unaware not only that they were placing such a call,
71
but also that exiting from the site did not terminate the call. The Moldovan
72
horse scam was inevitably short-lived. A sudden spike in the aggregate volume
73
of U.S.-Moldova telephone traffic, followed by the delivery of outlandish phone
74
bills to individuals, soon suggested the existence of a problem.
75
76
One way
77
to turn almost anything into a conceptual Trojan horse is to attach the word
78
stealth to it as a modifier. The relatively recent term stealth
79
candidate has had two meanings. One refers simply to a candidate who seems
80
not to show up on the political radar screen--George Bush used the term this
81
way in speaking of his opponent, Michael Dukakis, in 1988. The other, now more
82
common, meaning harbors an element of deviousness: Stealth candidates in state
83
and local elections in 1992 and 1994, for example, were Trojan stalking horses
84
for fundamentalist Christian forces--men and women who emphasized popular,
85
secular conservative issues in their campaigns but failed to disclose that
86
their candidacies had been covertly planned and energized by the religious
87
right. Stealth in both usages obviously builds on the precedent of the
88
B-2 Stealth Bomber, the strategic aircraft built by the Northop Corp. that can
89
penetrate enemy air defenses undetected. The aircraft, in turn, eventually gave
90
rise to the Stealth condom, whose manufacturer was sued by Northop in 1991 for
91
trademark infringement. The Stealth condoms were red, white, and blue--a Trojan
92
horse of another color, one might say--and were sold in a deltoid package
93
reminiscent of the Stealth Bomber's design, bearing the motto "They'll Never
94
See You Coming." Northop alleged that the condom's name was "likely to cause
95
confusion, or to cause mistake, or to deceive," a concern that might have been
96
more understandable if each condom came with a billion-dollar price tag.
97
Northrop in the end decided to drop the matter.
98
99
ATrojan horse in espionage is a mole , a foreign
100
agent who has burrowed deep into a society or government. The connotation is of
101
Cold War provenance and was given broad currency in large part through the
102
novels of John Le Carré, whose longtime protagonist, the spy master George
103
Smiley, has pursued moles within British intelligence. Those within a
104
population who sympathize with an enemy's aims, and may render assistance when
105
the time is ripe, constitute a fifth column , a term that goes back to
106
the Spanish Civil War and the remark of a rebel general, Emilio Mola, to the
107
effect that his four columns of troops would be supplemented by a civilian
108
quinta columna , a fifth column of sympathizers, in their attack on
109
Loyalist-held Madrid in 1936. Ernest Hemingway published a play with the title
110
The Fifth Column in 1938. Numerical terminology (think third
111
wave , fourth
112
dimension , fifth
113
estate ,
114
sixth
115
sense ) is an open invitation to extension. Franklin
116
Roosevelt used the term sixth column in 1942 to refer to
117
rumor-mongerers, hoarders, and others who unwittingly hampered the war effort;
118
the term seventh column was applied later to those whose carelessness
119
led to industrial accidents. If every new refinement since then in the quiet
120
sapping of our national morale has earned a numerical "column," then by now, I
121
estimate, we must be up somewhere close to "78 th column" (applied,
122
maybe, to producers of the weekly network TV movies about bloody domestic
123
mayhem) and "79 th column" (airplane passengers who bring carry-on
124
luggage that they know won't fit into the overhead storage bins) or possibly
125
even higher.
126
127
And my sixth sense tells me
128
that it won't stop there.
129
130
131
132
133
134