Dust Off Your Library Card

chalk outline, body

You see so many reviews of brand new crime novels on this website because, as you may know, I read and review them for the fantastic UK website CrimeFictionLover.com. Occasionally, I dig into my book pile and find something not suitable for CFL. Possibly it’s a book that’s been out a while, a new book already reviewed by CFL or in one case below, great non-fiction. A post for another day is a list of not-crime books. There is such a thing!

***Identical
By Scott Turow (2013) – if you want a novel full of twists and turns, this one has it. If you want a novel that stretches the bonds of plausibility, you have that too. Twin brothers Cass and Paul (Castor and Pollux, get it?) couldn’t be more different. One is running for city mayor, the other about to be released from jail after 25 years. He pled guilty to the murder of his girlfriend Aphrodite Kronon. Confusions worthy of the ancient Greeks and arising from twinhood are here, fairly predictably.

****Statute of Limitations
By Steven F. Havill (2006) – This is one of Havill’s meticulous police procedurals set in small-town New Mexico. I’ve read three of them, and I love them! A retired police chief abandoned after collapsing from a heart attack, a body in an arroyo, a late-night attack—this Christmas season is certainly not filled with goodwill toward mankind. Under-sheriff Estelle Reyes-Guzman doesn’t miss a beat.

****The Aosawa Murders
By Riku Onda (2005), translated from the Japanese by Alison Watts – Newly published in English, the scenes in this prize-winning book are like a set of still lifes. Different points of view describe a crime in which 17 members of a single family were murdered, with only one survivor, a young blind woman. Gradually, the crime is pieced together. Lovely writing, stellar cover.

***False Light
By Claudia Riess (2019) – This is the second outing for amateur sleuths, art experts, and randy spouses Erika Shawn and Harrison Wheatley. Their challenge this time is to decipher a coded message from a famous art forger, now dead. Supposedly, it will identify some of his works masquerading in prestigious collections as the real thing. It’s a great set-up, and if you’re a fan of art world skullduggery, you may enjoy this, but I found the denouement implausible.

*****Breaking and Entering
By Jeremy N. Smith (2019) – Subtitled “the extraordinary story of a hacker called ‘alien,’” this is the nonfiction story of a woman’s career from her exploits as an MIT undergraduate through to her current role consulting with banks, government agencies, and others on security issues. Cybersecurity is their big concern, and she and her team are cyber experts, but they also routinely prove to clients that good old humanware can be their weakest link. Fascinating.

***Net Force: Dark Web

photo: openDemocracy, creative commons license

Jerome Priesler’s new techno-thriller, Net Force: Dark Web carries on a series created by the late Tom Clancy and Steve Pieczenik, but lacks the immersive, gotta-turn-the-page qualities of Clancy’s work. It’s certainly true that cybersecurity becomes more consequential by the day, but this book doesn’t make the case.

True to current thriller-writing style, it comprises short chapters of a few pages that skip around to cover the actions of a large number of players, among them: black hat hackers versus white hat hackers, corrupt African leaders, the President of the United States and her new cyber-initiative team, CIA and FBI operatives, parking garage attendants, and moms with kids. In other words, a lot. Too much, in fact. If an author expects to maintain your interest for around 700 pages, the length of the paperback version, at least some of those characters should be written in enough depth to make you care about them.

The story starts strong, with a prologue set in 2023 in Malta (why this was a “prologue” and not just Chapter 1, I don’t know, as it’s contemporaneous with the rest of the story and integral to it). A young woman who has something to do with software development flees through city streets, trailed not just by men in vehicles, but also by a drone following her every twist and turn.

Just as you’re rooting for her escape, in a nice reversal, she’s captured, and you learn her pursuers are CIA and she may not be one of the good guys after all. Then the action moves to Romania where black hat operators plan to use the woman’s clever software to take control of a wide array of computers. They probably can’t anticipate the full ramifications of their project, given the near-future pervasiveness of the Internet of Things. The CIA wants the woman’s help, but she’s resisting.

I won’t go into how all the other plot threads and descriptive elements merge with this set-up, except to say some of them don’t. The entire Africa plotline was extraneous to the story; deleting it would have reduced the page count. Likewise, Priesler describes every new character at length, whether they reappear or not. You may regret struggling to remember all those backstories.

What makes a techno-thriller work is confidence that the author has the technology down pat (good examples are Ghost Fleet or This is Gomorrah). Inevitably, a moment arrives when the author goes out on a limb, when you must suspend disbelief and just hang in, but I never reached that point of trust. As far as I can tell from his past works, Priesler has not written this type of book before, and it shows.

Photo: openDemocracy, creative commons license

Go Like Hell! On Screen

The new movie, Ford v Ferrari, is based on the exciting 2010 book, Go Like Hell: Ford, Ferrari, and Their Battle for Speed and Glory at Le Mans, by AJ Baime. The movie, directed by James Mangold, stars Matt Damon, Christian Bale, and Tracy Letts (trailer). It opened while I was in Egypt and audiences love it! (98% audience score on Rotten Tomatoes). Critics too: 91%.

I’ve listened to the book twice over the years. If the movie is as good as the book, it’s a must-see. It is for me, no matter what. Here’s my review of the book, read by Jones Allen.

Go Like Hell is the story of classic duels of machine and driver in the French countryside.There’s just enough biography of Henry Ford II (the Deuce) and Enzo Ferrari to understand the motivations of these two rivals, willing to stake their fortunes, their companies’ futures, and (all too often) their drivers’ lives on this grueling competition.

The Deuce believed—correctly—that supremacy in the racing circuit would lead to sales of Ford cars. The components that had to be developed to survive the 24-hour race at Le Mans were testaments to product reliability as well as power, and many advances originally developed for racing vehicles—such as independent suspensions, high-performance tires, disc brakes, and push-button starters—have found their way into passenger cars.

For Enzo Ferrari, whose interest in consumer cars was always secondary to racing, the point was being the world’s best and proving it in the world’s most prestigious and dangerous sports car race, Le Mans.

If you’re at all familiar with auto racing’s “golden age,” the big names are all here: Carroll Shelby, AJ Foyt, Dan Gurney, Phil Hill, John Surtees, Ken Miles, Bruce McLaren, and an upstart kid from Nazareth, Pennsylvania, who took the pole position in the Indianapolis 500 the year I saw that race, Mario Andretti. To get an idea of the speeds they achieve, Baime notes that at top speed, they complete the 100-yard distance of a football field in one second.

This was a fast, fun read that shifts between Dearborn, Shelby’s racing car development team working for Ford in Southern California, and Ferrari’s workshop in Maranello, Italy. For a Detroit girl like me, whose grandfather, father, and many uncles worked for the Ford Motor Company, it was a thrill a minute! But even for people who don’t get goosebumps when they hear those Formula One engines roar, Baime’s cinematic recreation of the classic Le Mans races of 1965, 66, and 67, with all their frustrations, excitement, and tragedy is a spectacular true story.

Times have changed, and these past automotive battles have faded. But, hope is on the horizon. According to a 5/22/15 Jordan Golson story in Wired, new rules under consideration “could make Formula One exciting again.” Yea to that!

This is Gomorrah

night sky, light pollution

By Tom Chatfield – The potentially nefarious capabilities of the Internet have seeped from science fiction to technothrillers to non-fiction to the morning news. Now comes a debut novel on the topic by someone who is not only a technology expert but an entertaining storyteller.

Azi Bellow is a 34-year-old hacker holed up in a garden shed in South London with a load of computer equipment, exploring the dark web. In Azi’s world, it’s hard to know whom to trust, but he does trust his online friend Sigma. She feels the same, and when she finds herself in trouble asks for Azi’s help. She’s assembled extensive evidence that 50 confirmed Islamic martyrs are not actually dead but have acquired new identities. Naturally, no security service is looking for them.

Sigma believes these terrorists obtained fake IDs from Gomorrah, the darkest corner of the dark web, but now she’s on the run. Almost immediately Azi’s inner sanctum is invaded by a woman named Anna who makes it clear that he must help Sigma or Anna will reveal his quasi-legal and illegal activities to the authorities.

Thus is a thrilling cat-and-mouse game launched, with the urgency of Sigma’s situation prying Azi out of the shed into the real world. They flee England, and later he seeks refuge in Athens and, finally, Silicon Valley. It’s hard to stay ahead of Gomorrah.

Chatfield’s writing is full of sly commentary on technology and human (mis)behavior that will leave you laughing, crying, or both. While Anna and her team aren’t very likeable, Azi is, along with his venal childhood friend Ad and the desperate Sigma. All are experts at manipulation and establishing “…a context within which someone’s only choice is to do what you want, even if (especially if) they believe the decision is up to them.”

Tom Chatfield is the author of several nonfiction books (and TED talks) exploring digital culture. He’s been a visiting associate at the Oxford Internet Institute and advises numerous organizations about technology and media. He was a launch columnist for BBC’s worldwide technology site, BBC Future. In the acknowledgements he says, “Unlike reality, fiction has an obligation to make sense.” And for most of This is Gomorrah, Chatfield’s constructed reality does make sense. By the time it becomes too crazy, you will have already decided to trust him and just go with it!

Photo: woodleywonderworks, creative commons license.

A Puzzle Puzzle

Don’t ask me why these pictures are upside down. They are correct on my WordPress editing screen! ?

This jigsaw puzzle has been calling me since I received it as a gift last year. It depicts Thomas Moran’s famous painting, The Grand Canyon of the Yellowstone, which our family had just seen. Moran’s Yellowstone paintings were so admired, they helped lead to the declaration and preservation of Yellowstone as the first national park in the United States and, probably, the world.

And, here is the completed puzzle. Perhaps you’re struck with how different it is from the painting, how much redder and, in person, how much darker. All those murky reddish blacks on the right, those murky greenish blacks on the left (hidden by the light reflection), those murky blacks, and acres of taupe. Granted it’s weird, but I don’t consult the box when assembling a puzzle, just to make it that little bit harder; in this case, the picture on the box wouldn’t have been much help. But maybe it holds a clue to why the difference between the picture and the pieces. Oh, yes. Here it is: “Printed in China.”

Perhaps it wasn’t merely printed in China. Perhaps it was also cut with a jigsaw in China, its 1000 pieces disassembled, and 1001 of them sealed in their plastic bag. That would go a ways to solving another puzzle. See that extra blue piece? It’s a dupe. If you’re working on this puzzle and missing a bit of sky, I have it.

At the same time, you may have noticed the finished puzzle is missing three pieces. I have three pieces left over. But they don’t fit those spots. Maybe they’re dupes too. In the hundred or so puzzles I’ve assembled in my lifetime, I have never seen this before.

Where was quality control? Did the manufacturer think bagging up any old 1000 (or 1001, in this case) pieces would be good enough? After all, wasn’t that a 99.6% accuracy rate?

I realize that a jigsaw puzzle is not a fate-of-the-world consumer item, but you have to wonder about a mindset that allows the sloppy handling of something so simple, yet precise, and what happens when something critical, yet precise, isn’t quite right. Like a component for your driverless car or nuclear power plant or corporate computer system. I think we know the answer to that.

In the movie Puzzle, the character Agnes says the rewarding thing about doing a jigsaw puzzle is, when you get to the end, you know you’ve made “all the right choices.” The folks involved in the supply chain for this product did just the opposite.

Cybersecurity: What the Experts Say

cyberspace

If only I were as clever as Brad Parks who took his outrage over the pass given to Wachovia and Wells Fargo Bank execs who laundered many millions of dollars for a Mexican drug cartel (and they’re still at it) and turned it into a fantastic new thriller, The Last Act (my review here). What you’ll read below has the seeds of innumerable great and terrifying stories, but when I read it, I start spitting. These quotes were a handout for my Great Decisions group, a discussion program sponsored by the Foreign Policy Association

 “Our adversaries and strategic competitors will increasingly use cyber capabilities—including cyber espionage, attack, and influence—to seek political, economic, and military advantage over the United States and its allies and partners. China, Russia, Iran, and North Korea increasingly use cyber operations to threaten both minds and machines in an expanding number of ways—to steal information, to influence our citizens, or to disrupt critical infrastructure.” Daniel R. Coats, Director of National Intelligence statement to the Senate Select Committee on Intelligence as he presented the U.S. intelligence community’s assessment of worldwide threats, 29 Jan 2019.

“Few Americans realize the extent to which foreign intelligence services are stealing our most important secrets.” And “China is without question the number one counterintelligence threat facing the United States.” James Olson, former CIA Chief of Counterintelligence

“The Russian intelligence services, the inheritors of the legacy of their Soviet forebears, are our inexorable adversaries. They have at one time or another penetrated every significant organization and agency in the U.S. Government and, as evidenced by their recent efforts to undermine American democracy, are the most professionally proficient intelligence adversaries we confront.” Mark Kelton, former CIA Deputy Director for Counterintelligence

“Foreign cyber criminals will continue to conduct for-profit, cyber-enabled theft and extortion against U.S. networks.” And “Terrorists could obtain and disclose compromising or personally identifiable information through cyber operations, and they may use such disclosures to coerce, extort, or to inspire and enable physical attacks against their victims.” Daniel R. Coats

“The sheer acceleration in the number of attacks, and their rapidly changing goals, is one of several warning signs that we all are living through a revolution, playing out at digital speed.” David E. Sanger, The Perfect Weapon

“We cannot afford to protect everything to the maximum degree, so we’d better figure out what cannot fail.” Thomas Donahue, Senior Analyst, Center for Cyber Intelligence

Read More

I highly recommend Sanger’s The Perfect Weapon, P.W. Singer’s Like War: The Weaponization of Social Media, and if a well-constructed fictional scenario holds more appeal, P.W. Singer and August Cole’s 2015 near-future thriller, Ghost Fleet.

Photo: openDemocracy, creative commons license

They Shall Not Grow Old

New Zealand director Peter Jackson has accomplished something of a miracle. At the behest of Britain’s Imperial War Museum, he and his team have created a documentary about World War I using archival footage—scratched, faded, juddery—and restored it nearly to today’s standards (trailer). The process achieves more than improving watchability, it brings these soldiers to life.

When he received the assignment, Jackson didn’t know what the film would be, his brief was simply to “do something creative” with the film archive in time for the 100th anniversary of the armistice last November 11.

He and his team melded the restored film with the voices of men who had served, interviewed by the BBC decades later. They went to war as ordinary soldiers, they were young (ages 15, 16, and 17, many of them), and their reminiscences of the war were quite different than what their officers’ would have been. This isn’t a movie with battle maps and arrows, strategy and tactics. It’s not about the unique or memorable incident. It’s everyday survival. Mud and lice and rats and cigarettes. I cried.

Stick around for the post-movie feature about how the film was restored. The before-and-after examples of changing the timing, fixing over- and under-exposures, how sound was added, and the colorization are fascinating. Their devotion to detail pays off. Speaking of paying off, the film has broken box office records for a documentary, and Jackson himself took no fee.

This isn’t a movie about heroes. It’s about everyday lads doing the best they can in the worst circumstances. In the most important sense, they’re all heroes.Rotten Tomatoes critics rating: 99%; audiences 92%.

Cyberthreats: Coming to a Company Near You

The absurdity of a Seth Rogen movie precipitating an international incident may have obscured that episode’s significance as a bellwether in international cyberterrorism. Companies around the world have experienced massive thefts of intellectual property and disruption to their operations. Yet there’s no clear way forward for them. Three dramatic episodes illustrate.

Destruction of a Target’s Network

Remember Sony’s 2014 dust-up with North Korea? Given the reviews, The Interview would likely have quickly sunk into obscurity had The Hermit Kingdom not made an escalating series of threats, saying release of the film would be considered an act of terrorism. While the U.S. State Department was telling Sony it wasn’t in the business of censoring movies, North Korean hackers were penetrating Sony’s computer system top-to-bottom.

Our government was clueless about the company’s peril. Says David Sanger, “hackers working from laptops somewhere in Asia were not the kind of security threat [the NSA] was established to detect. And movie studios weren’t the targets the American intelligence community was focused on protecting.” The result was a worldwide takedown of the company’s computer systems.

Proliferating Malware

The NotPetya code, the malicious product of Russian military hackers, ultimately hit two thousand targets worldwide and cost companies an estimated $10 billion. Among the worst affected were the U.S. pharmaceutical giant Merck, FedEx’s European subsidiary, a French construction company, and Danish shipping company Maersk. Maersk, which lost some $300 million, salvaged its business only because a domain controller in Ghana already had been knocked offline when the malware struck.

Corporate Espionage

You’re probably familiar with how three Chinese hackers stole some 630,000 computer files related to the development and design of Boeing’s C-17 military transport plane, saving the Chinese government decades and billions in R&D. When the Chinese plane—the Xian Y-20—debuted at a Zhuhai air show, parked near the American C-17, the similarity between the two planes was inescapable. A gift to the Chinese from U.S. taxpayers.

According to a recent Wired article by Garrett M. Graff, “China’s extended campaign of commercial espionage has raided almost every highly developed economy, but far and away its biggest targets have been the military secrets of the United States.” He says many American companies were aware of the hacking, but have kept quiet to keep the huge China market.

What Next?

Such intrusions demonstrate that it isn’t enough to assume every company can (or will) sufficiently protect its own networks. “An individual company simply doesn’t have the resources or the capabilities to defend against a committed nation state attacker,” said Jamil Jaffer, founder of George Mason University’s National Security Institute in a recent Cipher Brief interview. Yet, for a host of reasons, government can’t do protect every business either.

Jaffer believes companies in key industries must start sharing threat data with each other. Though that’s against the grain, in a small way, it’s beginning to happen. Government may have a role, too, in some cases, depending on the target, the severity of the threat, and applicable law. But this strategy will take time, and as all these complex relationships and responsibilities are being debated and worked out, the hackers hurtle full speed ahead.

As an Amazon Associate I earn from qualifying purchases—a few pennies to put in a jar to pay my WordPress bills. When you make a purchase through the link on my website, you help me fill the jar. Thank you!

*****LikeWar: The Weaponization of Social Media

In David Sanger’s chilling book about the dangers of cyberweapons, reviewed here last week, he includes the impact of Facebook, Twitter, and other social media, but P.W. Singer and Emerson T Brooking focus laserlike on them in LikeWar: The Weaponization of Social Media. If you want to know chapter and verse about the barrage of efforts to manipulate American opinion in the election of 2016—and risk of even more in future—this is the book for you.

Singer and Brooking’s book, like Sanger’s, pulls together in one place the various threads of information about cyberthreats from the last few years, weaving them into a coherent, memorable, and understandable(!) whole. All these authors provide exhaustive lists of sources. It’s incumbent on responsible people to understand the tactics of information warfare, because, “[recent Senate hearings] showed that our leaders had little grasp on the greatest existential threat to American democracy,” said Leigh Giangreco in the Washington Post.

These ill-intentioned manipulators understand the human brain is hard-wired for certain reactions: to believe in conspiracy theories (“Obama isn’t an American”); to be gratified when we receive approval (“likes”!); to be drawn to views we agree with (“confirmation bias”). If we feel compelled to weigh in on some bit of propaganda or false information, social media algorithms see this attention and elevate the issue—“trending!”—so that our complaints only add to the virality of disinformation and lies. “Just as the internet has reshaped war, war is now radically reshaping the internet,” the authors say.

Contrary to the optimism of the Silicon Valley entrepreneurs who saw social media as a positive, democratizing force, this new technology is being used to destructive effect at many levels of society. At a local scale, for example, it bolsters gang violence in Chicago; at a national scale, it contributed to the election of fringe politicians; at a regional scale, it facilitated the emergence of ISIS; and at an international scale, it undergirds the reemergence of repressive political movements in many countries.

How to be a responsible citizen in this chaos? Like it or not, “we’re all part of this war,” the authors say, “and which side succeeds depends in large part on how much the rest of us learn to recognize this new warfare for what it is” and how ready we are for what comes next. Start by reading one—or both—of these important books.

As an Amazon Associate I earn from qualifying purchases—a few pennies to put in a jar to pay my WordPress bills. When you purchase this book by clicking on the photo above, you help me fill the jar. Thank you!

Genes and Genealogy

An unexpected delight of my stumbling genealogy researches has been discovering and re-discovering my cousins. Most of my father’s family lived geographically close to me when I was growing up, but as far as getting to know them–they might as well have been a thousand miles away.

My dad was the son of Hungarian immigrants who came separately to the United States in the early 1900s, met, married, lived in Michigan where my grandfather was a farmer and an autoworker. They had 15 children, 11 of whom survived to adulthood. They didn’t talk about their immigration experience. At all.

Online research added to the picture. The naturalization record for my grandfather, Ferencz Hegyi (with the last name spelled six different ways on two government forms), provided the date of his arrival and name of the ship he came on (the S.S. Chicago). He applied for naturalization after being in America for some years, and it listed children’s names, leaving no doubt this record was for my family.

From the ship manifest I found his father’s name—Ferencz, or Frank, the same as his—and the village he came from. Wow! My great-grandfather’s name and a definite place, Kondorfa. Still today Kondorfa has only a few more than 600 residents. It’s in far western Hungary, closer to Vienna and Bratislava than Budapest, in a German-Hungarian area called the Burgenland. Short of learning to speak Magyar and traveling there, my researches seemed to be bumping up against the proverbial brick wall.

One additional clue from the ship manifest was that Ferencz’s destination was South Bethlehem, Pa. Probably he planned to work at Bethlehem Steel, following in the footsteps of his older brother. I found a 1923 death certificate for 38-year-old Peter Hegyi from Kondorfa who died after being struck in the chest by a bar of steel. The certificate listed his parents’ names, Ferencz Hegyi and Julianna Fabian. Now I had my great-grandmother’s name too. But there my research string ran out.

In Your Genes

People ask me whether having a genetic profile helps with genealogy, and I always say yes! I spit into a cup for 23andMe many years ago. A couple of distant cousins on my mother’s side have contacted me, all having useful connections and information. Then, a few months ago, the surprise. A woman living near Bethlehem contacted me after noting our slight genetic match and the Hegyi name, which is found frequently in the area her family came from.

This distant cousin has website Jane’s Genes (very useful general/tips, too), and some careful research on Jane’s part revealed she’s my fifth cousin, once removed. Our common ancestors are my great-great-great-great grandparents Janos Herczeg (b 1747) and Rozalia Horvath (b 1755).

Jane has put me in touch with other cousins in Pennsylvania and the Midwest. I learned one of my grandfather’s younger sisters immigrated to South Bethlehem as well, and I’ve connected with her granddaughter. Our Midwest cousin is another genius at deciphering the spidery handwriting in the old Hungarian and Church records. Thanks to her diligence, I can now trace my grandfather’s family back six generations, to ancestors born in the early 1700s.

I’ve shared my written history of the Hegyi family, sparse though it is, with about a dozen first cousins—children of my father’s generation—and now regularly visit several of them in Indiana and Michigan. I didn’t have addresses for them all, though, and again 23andMe came through. The granddaughter of my Uncle Bill got in touch and, through her, I’ve communicated with her mother, my first cousin.

When I started working on family history, what I expected to explore was “history”; now I’ve learned it’s about “family” too.

Don’t forget to watch “Finding Our Roots” on PBS Tuesdays, 8 p.m., hosted by Henry Louis Gates. Every family has a story!