How Comic Sans got useful

Martha Gill's Irrational Animals column.

Whenever I want to impress someone at a party, I let them know I’m distantly related to Eric Gill. There’s always a pause as it sinks in. You know, Eric Gill. Eric Gill, for God’s sake – yes, the Eric Gill! They’re usually too polite to make a big deal of it, but to make sure they feel comfortable around me, I often end up doing most of the talking from then on in.

Well, he invented the typeface Gill Sans. It’s a sans-serif font and a British font – indeed, it would be hard to find a more British font. Its clean lines permeate the railways, the BBC, Penguin Books and the Church of England, and it has meshed itself with the establishment so deeply that it was a surprise to everyone to discover, in the late '80s, that its inventor once shagged his dog.

Yes. This font has a dark, dark history. So dark, in fact, that on unearthing it last year, Digital Arts magazine announced an immediate boycott, along with every typeface Gill ever molested (Perpetua, Joanna), in a piece titled “Art versus Evil”.

Digital Arts, I apologise for him. And perhaps you are right to leave this beautiful, clear-cut lettering out of your publication – but not necessarily for the reasons you think.

A recent paper by Daniel M. Oppenheimer entitled, pleasingly, “Fortune favours the Bold (and the italicised)” delivered a blow to lovely fonts everywhere by demonstrating that we absorb information better when it is a little hard to read. It seems our eyes just skim over Times New Roman and Helvetica, but stick when we reach a smudged, cramped line of type, finally ready to engage.

The researchers took classroom material and altered the fonts, switching from Helvetica and Arial to Monotype Corsiva, Comic Sans Italicised and Haettenschweiler. The teachers already taught each class in two sections. One section was taught using the “fluent” texts, the other, the “disfluent”. After several weeks, the researchers put the students through some tests. They found that those taught using dirtier fonts retained information significantly better.

To the experimenters this was a challenge to one of teaching’s basic assumptions - that when learning is easier, it’s better. Rather, adding a few superficial difficulties to the reading experience is more likely to make pupils engage with the text. This ties in with other studies in “disfluency” - which show that a slightly challenging delivery can make people process information more carefully.

Difficult by design

The results are counterintuitive, and not only for the world of teaching. Neuroscientists expanding on the study note that the field of digital advancements also relies on the same idea - that the easier and more fluent our access to information, the better. But perhaps our oversensitive brains demand a strategy with a little more nuance.

The novelist Jonathan Franzen touched on the problem recently when he said that e-books make for a less fulfilling reading experience. He associates this with the permanence of books (“A screen always feels like we could delete that, change that, move it around”), but perhaps the feeling is also something to do with the uncanny ease of moving the text into view. Words presented to us with the effortlessness and clarity of motorway signs demand shallow engagement. A screen’s familiar form presents no mental barrier between an advert for Starbucks and lines from Shakespeare.

Perhaps then we should take cues then from Gill’s life, if not his works, and seek out our information in unfamiliar and dog-eared forms.

Gill Sans.

Martha Gill writes the weekly Irrational Animals column. You can follow her on Twitter here: @Martha_Gill.

This article first appeared in the 18 June 2012 issue of the New Statesman, Drones: video game warfare

Getty
Show Hide image

Marcus Hutchins: What we know so far about the arrest of the hero hacker

The 23-year old who stopped the WannaCry malware which attacked the NHS has been arrested in the US. 

In May, Marcus Hutchins - who goes by the online name Malware Tech - became a national hero after "accidentally" discovering a way to stop the WannaCry virus that had paralysed parts of the NHS.

Now, the 23-year-old darling of cyber security is facing charges of cyber crime following a bizarre turn of events that have left many baffled. So what do we know about his indictment?

Arrest

Hutchins, from Ilfracombe in Devon, was reportedly arrested by the FBI in Las Vegas on Wednesday before travelling back from cyber security conferences Black Hat and Def Con.

He is now due to appear in court in Las Vegas later today after being accused of involvement with a piece of malware used to access people's bank accounts.

"Marcus Hutchins... a citizen and resident of the United Kingdom, was arrested in the United States on 2 August, 2017, in Las Vegas, Nevada, after a grand jury in the Eastern District of Wisconsin returned a six-count indictment against Hutchins for his role in creating and distributing the Kronos banking Trojan," said the US Department of Justice.

"The charges against Hutchins, and for which he was arrested, relate to alleged conduct that occurred between in or around July 2014 and July 2015."

His court appearance comes after he was arraigned in Las Vegas yesterday. He made no statement beyond a series of one-word answers to basic questions from the judge, the Guardian reports. A public defender said Hutchins had no criminal history and had previously cooperated with federal authorities. 

The malware

Kronos, a so-called Trojan, is a kind of malware that disguises itself as legitimate software while harvesting unsuspecting victims' online banking login details and other financial data.

It emerged in July 2014 on a Russian underground forum, where it was advertised for $7,000 (£5,330), a relatively high figure at the time, according to the BBC.

Shortly after it made the news, a video demonstrating the malware was posted to YouTube allegedly by Hutchins' co-defendant, who has not been named. Hutchins later tweeted: "Anyone got a kronos sample."

His mum, Janet Hutchins, told the Press Association it is "hugely unlikely" he was involved because he spent "enormous amounts of time" fighting attacks.

Research?

Meanwhile Ryan Kalember, a security researcher from Proofpoint, told the Guardian that the actions of researchers investigating malware may sometimes look criminal.

“This could very easily be the FBI mistaking legitimate research activity with being in control of Kronos infrastructure," said Kalember. "Lots of researchers like to log in to crimeware tools and interfaces and play around.”

The indictment alleges that Hutchins created and sold Kronos on internet forums including the AlphaBay dark web market, which was shut down last month.

"Sometimes you have to at least pretend to be selling something interesting to get people to trust you,” added Kalember. “It’s not an uncommon thing for researchers to do and I don’t know if the FBI could tell the difference.”

It's a sentiment echoed by US cyber-attorney Tor Ekeland, who told Radio 4's Today Programme: "I can think of a number of examples of legitimate software that would potentially be a felony under this theory of prosecution."

Hutchins could face 40 years in jail if found guilty, Ekelend said, but he added that no victims had been named.

This article also appears on NS Tech, a new division of the New Statesman focusing on the intersection of technology and politics.

Oscar Williams is editor of the NewStatesman's sister site NSTech.