Espionage at the Molecular Level

In the world of espionage, privacy and security are top priorities to the success and safety of secret agents. Over the centuries, spies have utilized an evolving series of techniques to maintain the privacy of their confidential information.

In Roman times, authors of secret information tinkered with plant extracts to make invisible ink, and that clandestine art was used well into modern times. However, such inks remained invisible only until heat, special lights or chemical solutions were used, and that fact also made the information available to clever enemies.

Although cryptography and encryption furnished modern society with new ways to make information private, these security methods also became vulnerable to the clever adversary in this age of advanced computer technology.

Scientists now have found a new method to encrypt information in much the same way as the Enigma machine allowed the German army in World War II to encrypt and decrypt messages without fear of interception. Comprised of a series of rotors that produced a code, the sender could use the Enigma to encrypt a message and send it by radio. Only a recipient who knew the initial rotor settings could decrypt the message using their own Enigma machine. The discovery and eventual decoding of the German Enigma machine by Allied powers became a major factor in defeating the German Empire.

Presently, researchers are working with cryptography to synthesize specific chemicals that serve as highly secure passwords based on their atomic composition to produce a sort of chemical Enigma system.

In this case, the chemical Enigma system consists of a fluorescent amino acid structure (elemental components of various proteins) that can bind to various other compounds. With this “chemical device system,” the sender converts a message into a code, such as each letter representing a number, and dissolves that message into a specific chemical solution.

All the recipient of that message needs to do is add the same chemical and solvent as the sending device to produce the conditions which decrypt the message—much like a recipient in the past used the same rotor settings on the Enigma machine to reproduce readable text.

To be able to read this special chemically dissolved message with this molecular technique, a spy only needs to add the same chemical and solvent to produce a fluorescence emission to decipher the code and receive the message.

What all this technical jargon boils down to is that someone can hide a message within the molecular chemical sensor in a solution and allow that liquid to absorb into something like paper or cloth, and another person (another spy) could soak the paper or cloth in a liquid with the same chemical configuration to unlock the ciphered text, which is then read with special cryptography.

I can envision a spy using a very simple eyedrop solution to drip a message onto a napkin and that would allow another spy to easily retrieve that napkin, dissolve it in a solution and then decode the message. 

What makes this spy tool so advantageous is that there are so many chemical compounds available that can be fluoresced to hide a message within a chemical compound. The important key is that both the encryptor and the decryptor must know the secret chemical reaction required to allow the message to be retrieved.

Scientists believe there are large numbers of compounds available that could be chosen for the reaction sequence. The important key is that the chemical methodology to encrypt and decrypt should be applied with molecules that have a high level of structural complexity, and the chemical process should be simple, robust and predictably reproducible.

As a final layer of security, the chemicals used should be as thermally and chemically inert as possible—what scientists call “a one-pot reaction” to unlock the chemically-imbedded message.

I think I have the beginnings of a plot for a new short story here!

Thoughts? Comments? I’d love to hear them!

About James J. Murray, Fiction Writer

With experience in both pharmaceutical manufacturing and clinical patient management, medications and their impact on one’s quality of life have been my expertise. My secret passion of murder and mayhem, however, is a whole other matter. I’ve always loved reading murder mysteries and thrillers, and longed to weave such tales of my own. Drawing on my clinical expertise as a pharmacist and my infatuation with the lethal effects of drugs, my tales of murder, mayhem and medicine will have you looking over your shoulder and suspicious of anything in your medicine cabinet.
This entry was posted in About James J. Murray, All About Murder, Blog Writers, Blogging, Chemical Encryption, Chemical Enigma System, Chemical Passwords For Security, Chemical Weapons Discussions, Chemicals Used For Murder, Designing Murder Plots, Developing Story Plots, Developing Storyline Ideas, Elements of Murder, Fiction Based on Facts, Fiction Based on Real Life, Fluorescent Spy Technology, Interesting Event and Ideas Develop into Short Stories, James J. Murray Blog, Modern Espionage, Modern Espionage in Fiction Writing, Murder Mayhem and Medicine, New Blog, New Methods To Kill Characters in Your Novel, Plot Development, Plot Ideas and Where They Come From, Plotting Short Stories, Prescription For Murder Blog, Short Story Development, The Art of Storytelling, The Science of Murder, Unique Murder Plots and tagged , , , , , , , , , , , , , , , , , , . Bookmark the permalink.

4 Responses to Espionage at the Molecular Level

  1. Fascinating post, my friend. Thank you for sharing all of your interesting research!

  2. Amy Rogers says:

    Very cool. I’ve also heard about coding messages in DNA, though I’m unclear about the details of how that works. This was a significant plot element in Paul McEuen’s science thriller SPIRAL

  3. You find the coolest stuff!

  4. Thanks, James and Jacquie. I really appreciate your comments and support. There are so many interesting things in this world to include in fiction writing! 🙂

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s