Obfuscation (song)
   HOME

TheInfoList



OR:

Obfuscation is the obscuring of the intended meaning of
communication Communication (from la, communicare, meaning "to share" or "to be in relation with") is usually defined as the transmission of information. The term may also refer to the message communicated through such transmissions or the field of inqui ...
by making the message difficult to understand, usually with confusing and ambiguous language. The obfuscation might be either unintentional or
intentional Intentions are mental states in which the agent commits themselves to a course of action. Having the plan to visit the zoo tomorrow is an example of an intention. The action plan is the ''content'' of the intention while the commitment is the ''a ...
(although intent usually is connoted), and is accomplished with
circumlocution Circumlocution (also called circumduction, circumvolution, periphrasis, kenning, or ambage) is the use of an unnecessarily large number of words to express an idea. It is sometimes necessary in communication (for example, to work around lexical ga ...
(talking around the subject), the use of
jargon Jargon is the specialized terminology associated with a particular field or area of activity. Jargon is normally employed in a particular communicative context and may not be well understood outside that context. The context is usually a partic ...
(technical language of a profession), and the use of an
argot A cant is the jargon or language of a group, often employed to exclude or mislead people outside the group.McArthur, T. (ed.) ''The Oxford Companion to the English Language'' (1992) Oxford University Press It may also be called a cryptolect, argo ...
(
ingroup In sociology and social psychology, an in-group is a social group to which a person psychologically identifies as being a member. By contrast, an out-group is a social group with which an individual does not identify. People may for example ide ...
language) of limited communicative value to outsiders. In
expository writing The rhetorical modes (also known as modes of discourse) are a long-standing attempt to broadly classify the major kinds of language-based communication, particularly writing and speaking, into narration, description, exposition, and argumentatio ...
, unintentional obfuscation usually occurs in
draft document In the context of written composition, "drafting" refers to any process of generating preliminary versions of a written work. Drafting happens at any stage of the writing process as writers generate trial versions of the text they're developing. ...
s, at the beginning of
composition Composition or Compositions may refer to: Arts and literature *Composition (dance), practice and teaching of choreography *Composition (language), in literature and rhetoric, producing a work in spoken tradition and written discourse, to include v ...
; such obfuscation is illuminated with critical thinking and editorial revision, either by the writer or by an editor. Etymologically, the word ''obfuscation'' derives from the Latin , from ''obfuscāre'' (to darken); synonyms include the words beclouding and abstrusity.


Medical

Doctors are faulted for using
jargon Jargon is the specialized terminology associated with a particular field or area of activity. Jargon is normally employed in a particular communicative context and may not be well understood outside that context. The context is usually a partic ...
to conceal unpleasant facts from a patient; the American author and physician Michael Crichton said that
medical writing A medical writer, also referred to as medical communicator, is a person who applies the principles of clinical research in developing clinical trial documents that effectively and clearly describe research results, product use, and other medical i ...
is a "highly skilled, calculated attempt to confuse the reader". The psychologist
B. F. Skinner Burrhus Frederic Skinner (March 20, 1904 – August 18, 1990) was an American psychologist, behaviorist, author, inventor, and Social philosophy, social philosopher. He was a professor of psychology at Harvard University from 1958 until his ret ...
said that medical notation is a form of multiple audience control, which allows the doctor to communicate to the pharmacist things which the patient might oppose if they could understand medical jargon.


Eschew

"Eschew obfuscation", also stated as "eschew obfuscation, espouse elucidation", is a humorous fumblerule used by English teachers and professors when lecturing about proper writing techniques. Literally, the phrase means "avoid being unclear" or "avoid being unclear, support being clear", but the use of relatively uncommon words causes confusion in much of the audience (those lacking the
vocabulary A vocabulary is a set of familiar words within a person's language. A vocabulary, usually developed with age, serves as a useful and fundamental tool for communication and acquiring knowledge. Acquiring an extensive vocabulary is one of the la ...
), making the statement an example of irony, and more precisely a
heterological An autological word (also called homological word) is a word that expresses a property that it also possesses (e.g., "word" is a word, "noun" is a noun, "English" is an English word, " pentasyllabic" has five syllables, and "writable" is writab ...
phrase. The phrase has appeared in print at least as early as 1959, when it was used as a section heading in a
NASA The National Aeronautics and Space Administration (NASA ) is an independent agencies of the United States government, independent agency of the US federal government responsible for the civil List of government space agencies, space program ...
document. An earlier similar phrase appears in Mark Twain's ''
Fenimore Cooper's Literary Offenses "Fenimore Cooper's Literary Offenses" is an 1895 essay by Mark Twain, written as a satire and criticism of the writings of James Fenimore Cooper. It draws on examples from '' The Deerslayer'' and '' The Pathfinder'' from Cooper's Leatherstocking ...
'', where he lists rule fourteen of good writing as "eschew surplusage".


Secure communication

Obfuscation of oral or written communication achieves a degree of
secure communication Secure communication is when two entities are communicating and do not want a third party to listen in. For this to be the case, the entities need to communicate in a way that is unsusceptible to eavesdropping or interception. Secure communication ...
without a need to rely upon technology. This technique is sometimes referred to as "talking around" and is a form of
security through obscurity Security through obscurity (or security by obscurity) is the reliance in security engineering on design or implementation secrecy as the main method of providing security to a system or component. History An early opponent of security through o ...
. A notable example of obfuscation of written communication is a message sent by
September 11 attacks The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commer ...
ringleader
Mohamed Atta Mohamed Mohamed el-Amir Awad el-Sayed Atta ( ; ar, محمد محمد الأمير عوض السيد عطا ; September 1, 1968 – September 11, 2001) was an Egyptian hijacker and the ringleader of the September 11 attacks in 2001 in which f ...
to other conspirators prior to the attacks occurring: In this obfuscated message, the following
code words ''Code Words'' is an online publication about computer programming produced by the Recurse Center retreat community. It began publishing in December 2014, and has a quarterly schedule. The journal features original work by participants at the Cent ...
are believed to exist: * "semester" refers to planned
September 11 attacks The September 11 attacks, commonly known as 9/11, were four coordinated suicide terrorist attacks carried out by al-Qaeda against the United States on Tuesday, September 11, 2001. That morning, nineteen terrorists hijacked four commer ...
* "19 confirmations" refers to the Hijackers in the September 11 attacks * "faculty of law" refers to a target, the
United States Capitol The United States Capitol, often called The Capitol or the Capitol Building, is the seat of the legislative branch of the United States federal government, which is formally known as the United States Congress. It is located on Capitol Hill ...
* "faculty of urban planning" refers to a target, the
World Trade Center World Trade Centers are sites recognized by the World Trade Centers Association. World Trade Center may refer to: Buildings * List of World Trade Centers * World Trade Center (2001–present), a building complex that includes five skyscrapers, a ...
* "faculty of fine arts" refers to a target, the
White House The White House is the official residence and workplace of the president of the United States. It is located at 1600 Pennsylvania Avenue NW in Washington, D.C., and has been the residence of every U.S. president since John Adams in ...
* "faculty of engineering" refers to a target,
The Pentagon The Pentagon is the headquarters building of the United States Department of Defense. It was constructed on an accelerated schedule during World War II. As a symbol of the U.S. military, the phrase ''The Pentagon'' is often used as a meton ...
Within the
illegal drug trade The illegal drug trade or drug trafficking is a global black market dedicated to the cultivation, manufacture, distribution and sale of prohibited drugs. Most jurisdictions prohibit trade, except under license, of many types of drugs throug ...
, obfuscation is commonly used in communication to hide the occurrence of drug trafficking. A common spoken example is "
420 420 may refer to: * 420 (number) *420 (cannabis culture), informal reference to cannabis use and celebrations on April 20 ** California Senate Bill 420 or the Medical Marijuana Program Act *AD 420, a year in the 5th century of the Julian calendar * ...
", used as a code word for
cannabis ''Cannabis'' () is a genus of flowering plants in the family Cannabaceae. The number of species within the genus is disputed. Three species may be recognized: '' Cannabis sativa'', '' C. indica'', and '' C. ruderalis''. Alternative ...
, a drug which, despite some recent prominent
decriminalization Decriminalization or decriminalisation is the reclassification in law relating to certain acts or aspects of such to the effect that they are no longer considered a crime, including the removal of criminal penalties in relation to them. This reform ...
changes, remains illegal in most places. The
Drug Enforcement Administration The Drug Enforcement Administration (DEA; ) is a United States federal law enforcement agency under the U.S. Department of Justice tasked with combating drug trafficking and distribution within the U.S. It is the lead agency for domestic en ...
reported in July 2018 a total of 353 different code words used for
cannabis ''Cannabis'' () is a genus of flowering plants in the family Cannabaceae. The number of species within the genus is disputed. Three species may be recognized: '' Cannabis sativa'', '' C. indica'', and '' C. ruderalis''. Alternative ...
.


White box cryptography

In white-box cryptography, obfuscation refers to the protection of cryptographic keys from extraction when they are under the control of the adversary, e.g., as part of a
DRM DRM may refer to: Government, military and politics * Defense reform movement, U.S. campaign inspired by Col. John Boyd * Democratic Republic of Madagascar, a former socialist state (1975–1992) on Madagascar * Direction du renseignement milita ...
scheme.Chow S, Eisen P, Johnson H, et al. A white-box DES implementation for DRM applications /Digital Rights Management. Springer Berlin Heidelberg, 2002: 1-15.


Network security

In
network security Network security consists of the policies, processes and practices adopted to prevent, detect and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves th ...
, obfuscation refers to methods used to obscure an attack payload from inspection by network protection systems.


In popular culture

* In
Animal Farm ''Animal Farm'' is a beast fable, in the form of satirical allegorical novella, by George Orwell, first published in England on 17 August 1945. It tells the story of a group of farm animals who rebel against their human farmer, hoping to c ...
, the pigs such as Squealer and Snowball use obfuscation to confuse the other animals with
doublespeak Doublespeak is language that deliberately obscures, disguises, distorts, or reverses the meaning of words. Doublespeak may take the form of euphemisms (e.g., "downsizing" for layoffs and "servicing the target" for bombing), in which case it is ...
in order to prevent any uprisings. *In the British Sitcom
Yes, Minister ''Yes Minister'' is a British political satire sitcom written by Antony Jay and Jonathan Lynn. Comprising three seven-episode series, it was first transmitted on BBC2 from 1980 to 1984. A sequel, ''Yes, Prime Minister'', ran for 16 episodes fr ...
, the character
Sir Humphrey Appleby Sir Humphrey Appleby is a fictional character from the British television series ''Yes Minister'' and ''Yes Prime Minister''. He was played originally by Sir Nigel Hawthorne, and both on stage and in a television adaptation of the stage show by ...
often uses obfuscation for comedic effect while trying to confuse and prevent
Jim Hacker James George Hacker, Baron Hacker of Islington, , BSc ( Lond.), Hon. D. Phil ( Oxon.) is a fictional character in the 1980s British sitcom '' Yes Minister'' and its sequel, ''Yes, Prime Minister''. He is the Minister of the (fictional) Depart ...
from taking charge.


See also

*
Black box In science, computing, and engineering, a black box is a system which can be viewed in terms of its inputs and outputs (or transfer characteristics), without any knowledge of its internal workings. Its implementation is "opaque" (black). The te ...
*
Cant (language) A cant is the jargon or language of a group, often employed to exclude or mislead people outside the group.McArthur, T. (ed.) ''The Oxford Companion to the English Language'' (1992) Oxford University Press It may also be called a cryptolect, argot ...
*
Code word (figure of speech) A code word is a word or a phrase designed to convey a predetermined meaning to an audience who know the phrase, while remaining inconspicuous to the uninitiated. For example, a public address system may be used to make an announcement asking fo ...
*
Doublespeak Doublespeak is language that deliberately obscures, disguises, distorts, or reverses the meaning of words. Doublespeak may take the form of euphemisms (e.g., "downsizing" for layoffs and "servicing the target" for bombing), in which case it is ...
*
Fallacy of quoting out of context Quoting out of context (sometimes referred to as contextomy or quote mining) is an informal fallacy in which a passage is removed from its surrounding matter in such a way as to distort its intended meaning. Contextomies may be either intentional o ...
*
Fuzzy concept A fuzzy concept is a kind of concept of which the boundaries of application can vary considerably according to context or conditions, instead of being fixed once and for all. This means the concept is vague in some way, lacking a fixed, precise me ...
*
Jargon Jargon is the specialized terminology associated with a particular field or area of activity. Jargon is normally employed in a particular communicative context and may not be well understood outside that context. The context is usually a partic ...
*
Mind games Playing mind games (also power games or head games) is the largely conscious struggle for psychological one-upmanship, often employing passive–aggressive behavior to specifically demoralize or dis-empower the thinking subject, making the a ...
*
Obfuscated code In software development, obfuscation is the act of creating source or machine code that is difficult for humans or computers to understand. Like obfuscation in natural language, it may use needlessly roundabout expressions to compose statemen ...
*
Obscurantism In philosophy, the terms obscurantism and obscurationism describe the anti-intellectual practices of deliberately presenting information in an abstruse and imprecise manner that limits further inquiry and understanding of a subject. There are two ...
*
Plain English Plain English (or layman's terms) are groups of words that are to be clear and easy to know. It usually avoids the use of rare words and uncommon euphemisms to explain the subject. Plain English wording is intended to be suitable for almost anyone, ...
*
Politics and the English Language "Politics and the English Language" (1946) is an essay by George Orwell that criticised the "ugly and inaccurate" written English of his time and examined the connection between political orthodoxies and the debasement of language. The essay ...
* Propaganda *
Steganography Steganography ( ) is the practice of representing information within another message or physical object, in such a manner that the presence of the information is not evident to human inspection. In computing/electronic contexts, a computer file, ...
*
Verbosity Verbosity or verboseness is speech or writing that uses more words than necessary. The opposite of verbosity is plain language. Some teachers, including the author of ''The Elements of Style'', warn against verbosity; similarly Mark Twain and Er ...


References


External links

* {{Media manipulation Human behavior English phrases Ambiguity Psychological abuse