Book review: Too Close to Home by Seraphina Nova Glass

book cover for Too Close to HomeThis novel by Seraphina Nova Glass was appealing. A car bomb goes off killing one of the characters in this idyllic suburban town, and then things start to go immediately wrong. It is an interesting take on the genre I like to call “cul de sac murders” and while there are a bit too many characters for my taste, the plot points are moved along and the mysteries start to pile up. The moms who are sleuthing things are living a double life of detective and raising their kids, and the younger generation is also involved in some of the town’s mysteries. The novel is well written with lots of descriptive devices and keeps you guessing as to who is at the center of all the mayhem and murder up until nearly its end. Highly recommended.

Book review: Code War: How nations hack, spy and shape the digital battlefield

Code War: How Nations Hack, Spy, and Shape the Digital BattlefieldAllie Mellen has written an interesting book that takes the reader through a comprehensive historical narrative of the past several decades’ worth of state-sponsored cyber attacks. While there have been numerous books on this topic, what makes this book unique is that she examines attacks that have been attributed to the US, Russia, and China, and shows their common and different approaches, and how they mix cyber warfare with their on-the-ground kinetic battles, such as what is happening in Ukraine over the past several years. 

Mellen comes to this from a deep experience with cybersecurity, including five years as an analyst at Forrester Research and several jobs for private cybersecurity vendors. 

Code War covers a lot of ground – from the earliest days of history to the present era, and how the modern digital age is just another way to repackage some of the ancient analog exploits. That deep historical coverage sets this book apart from other efforts that just skip lightly over the details and relevance of these antecedents. 

Each country has separate ways that they approach cybersecurity, both from offensive and defensive positions. Each also has different contexts in which it evaluates its cyber efforts. The US context is to ensure its national security, maintain a strong economy, and support various freedoms. China wants to maintain its regime stability, protect its national interests, and regain control and influence in Asia. Russia wants to maintain economic stability, ensure its citizens are loyal to the regime, and remain a world superpower. These mixed goals compete and conflict with each other. And while it is great to have goals, the contradictions and conflicts among them make it hard for each regime to clearly evaluate and execute its cyber efforts. 

Part of the problem, when seen in this tripartite context, is that the role and nature of the internet is vastly different among the countries. China’s internet is an instrument of state power, cultivated by absolute control. Russia’s internet is part of an hybrid digital/analog background of warfare against the world’s democracies. And in the US, the internet is part of maintaining a defensive and resilient digital ecosystem. 

One element in common with these efforts is their work to isolate their residents from the global internet community. These “splinternet” efforts restrict  freedom of speech and as Mellen notes, it “becomes more difficult to spread democratic values globally.” She chronicles the key steps of isolation and control of the internet with a series of well-researched case studies.

Mellen proceeds to deconstruct operational playbooks of the three nations, and how they have used cyberattacks to fulfill their social contracts with their citizenry. The American chapters cover a wide range of cyber misdeeds, including one chapter that tells the stories about how Nathan Van Buren and Aaron Swartz independently ran afoul of various federal laws about computer network security. Swartz got caught illegally copying millions of academic research articles in his campaign to make this information more publicly available, eventually killing himself rather than cop a plea. Van Buren was a Georgia cop who was charged with illegally unauthorized access to law enforcement databases, a case that went to the Supreme Court.  

Another historical luminary is a story of how Ben Franklin constructed one of the first disinformation campaigns. Granted, the internet was yet to be invented, but his playbook – using racist overtones – is very similar to many of the present day’s digital campaigns. “Disinformation operations have always been part of the US experience, they are just more easily scalable with the internet,” she writes.

Another story concerns how in the mid-1800s, Edgar Allen Poe was part of an abysmal voting practice called cooping, whereby people voted early and often, receiving free booze for their efforts. Mellen uses this to take a closer look at how American voting practice has become more secure, despite exaggerated recent claims to the contrary. This includes the efforts of the Cybersecurity and Information Security Agency that was once a leader in securing our elections before it lost its mission, its director Chris Krebs and at least a third of its staffers in 2024. 

Most IPJ readers are familiar with the stories about how Iran and Russia hacked our 2016 and 2020 elections, but Mellen dives into the details, showing how Iran for example tried to alter the final voting tabulations in 2020. Also a familiar tale for many readers is the plight of Phil Zimmerman, inventor of Pretty Good Privacy and how it became a legal lightning rod and the first technology to be designated a war-based munition. This has echoes of the current day whereby the Defense Department can designate Anthropic’s AI similarly (and perhaps equally unjustly).

Most of us are familiar with China’s Great Firewall, but Mellen describes its companion isolation and protective programs including the Golden Card Project (its own online financial network) and the Golden Shield Project (its national surveillance and censorship network). Some of these containment efforts have been abject failures, such as the Green Dam software that was a required application begun in mid-2009 to be installed on all Chinese computers and phones. The software was buggy and so unwieldy that the state eventually gave up the project within a few months.

Mellen analyzes numerous Russian attacks and susses out four common elements of their playbooks:

  1. denial of service attacks, including GPS and satellite jamming,
  2. Traditional espionage operations,
  3. Psychological operations, such as phishing, disinformation, and audio/video deepfakes, and 
  4. Malware-based data wipers.

Each of these elements has evolved over time, and carries its own hybrid physical attack vectors to amplify the attack. As I mentioned earlier, Ukraine is where all four of these elements were brought together alongside the physical warmaking machinery to form a single continuous battlespace.

Mellen’s tour through history and technology shows how political leadership has failed to live up to promises with its citizenry to maintain and improve their respective social contracts: China’s prosperity is crumbling, Russia’s safety is evaporating, and America’s economic divide continues to worsen. By having this deep historical dive, the reader can see where things went off the rails, and why.

Missing from her excellent treatment of world powers is a focus on Iran, although it is mentioned briefly in several case studies. Also missing is more than a passing glance at AI. 

Mellen concludes with a dark vision of the “fourth power,” that of the major tech companies who treat their users as “digital peasants living in a world of corporate feudalism. Users till the soil (creating data), pay taxes (such as subscription fees), and live in castles (the digital platforms themselves), having no say in how the kingdom is governed.” The real nation states like China, Russia and the US and the digital nation-states such as Google, Apple, and Meta all want your data and your attention so they can exploit you and leverage your resources.

Book review: How to get away with murder

Meet Denver Brady, avowed serial killer and author of a book with the same title as this novel. His work forms the book-within-a-book, more of a step-by-step instruction on how to off someone and escape to do it again and again. The book is found in the novel’s primary murder victim’s hands at the start of the novel, which begins the manhunt by inspector Samantha Hansen, who is coming off compassionate leave and back on the force. Sam, as she likes to be called, is beset with loads of problems, both emotional and physical, and has trouble concentrating on clues that should be obvious to her (maybe not for all readers however) as she tries to solve the novel’s murder. She reads along the how-to book and tries to align the clues in the book with the ones she uncovers during the course of her investigation. The novel mostly takes place in and around London, and has loads of plot twists and turns, right up to its very end. I won’t give away any of these because they are deliciously put together. Many murder mysteries run out of gas towards the end but this book — or should I say the combined books — holds your attention until nearly the last page. I highly recommend this novel by Rebecca Philipson.

Book Review: The Bolden Cylinder by Norman Woolworth

The Bolden Cylinder: A Bruneau Abellard NovelAn old wax cylinder was discovered in a New Orleans attic containing a recording of a an century-old jazz pioneer. The cylinder ends up missing at the same time as an arsonist burns down the home it was last seen. The mystery widens to some unsavory characters and some interesting plot twists that weave various real locations around town, so those readers familiar with the city might enjoy the travel scenes. The double murder/arson investigation — a dead body is discovered in the burnt-out home that has been there for decades — proceeds in fits and starts, and with just the right mix of action, dialogue and suspense. I thought some of the plot points could have been described more sharply, but would recommend this mystery nonetheless. Buy the book on Amazon here.

Book review: The Jills by Karen Parkman

book cover for The JillsThe title characters of The Jills are members of the cheer squad supporting the Buffalo Bills football team, and what happens when trouble envelops several of them. It is loosely based on the reality and challenges faced by these women — low pay, ridiculous work requirements that dictate every moment of their lives: how they look, what they eat, and so forth. One of the Jills is missing, and foul play is suspected. Two sisters are at the heart of the plot: one a Jill, and one who is in and out of various addiction 12-step programs. Lurking on the sidelines is a Buffalo crime family that who is dating the missing Jill. The novel’s verisimilitude is spot-on, and the scrapes that the two sisters get into drives the plot forward and provides for a fast-paced read. Highly recommended.

Book review: Spies, Lies and Cybercrime by Eric O’Neill

Spies, Lies, and Cybercrime: Cybersecurity Tactics to Outsmart Hackers and Disarm ScammersEric O’Neill has had an interesting career hunting down some of the worst spies and cybercriminals (he was one of the principals behind the takedown of Robert Hanssen). His book is a part travelogue, part instruction and best-practices manual, and part a detailed narrative of how cyber attackers ply their trade. If you haven’t heard of a few of the exploits (Colonial Pipeline, Solar Winds, WannaCry, and many others), this book is useful in describing the back story of these and others that have receded from the headlines. He draws on his own experiences at fighting these attackers from real life IT workers that are trying to keep their networks secure and protected, and “another grim reminder that once your data is out there, it’s out there for good—­ and the dark web has no return policy,” as he writes. The dark web – where criminals operate – has a gross cybercrime haul greater than Germany and Japan’s GDP combined.

We have already reached the place where we can’t trust everyday sites such as texts, FaceTime, Teams and other social sharing platforms. “Trust has become an uncommon commodity.”

O’Neill has spent years as a national security lawyer, corporate investigator and part of the threat response teams for cybersecurity vendors, so he knows the landscape very well. He wrote this book for a laudable purpose: “If enough of us become covert agents and learn to safeguard our personal data, we can also make the world safe from cyberattacks. This is how we start. One data point at a time.” His philosophy is that we must do better and start thinking like our adversaries if we are to repel their digital advances. “There are no hackers, there are only spies.” His years in law enforcement “left me with a simple axiom: Criminals are lazy. If they weren’t, they’d get day jobs.” So true. And being patient in understanding how your business has been compromised will pay off in finding where the breach took place and how to shore up your defenses.

The end of the book is worthy of clipping as a ready reference, what he calls the Spy Hunter Tool Kit. It is a list of dozens of valuable suggestions, such as never respond to a phishing text (such as the one I got while I was writing this review, asking me to change my PayPal password. (I no longer have a PayPal account, having gotten tired of all the scams and come-ons such as this one.)

His book was written while AI blossomed (I guess that is one way to describe it) and audio and video deepfakes became more common. One way to suss out if they are fake is to move your hands wildly at the beginning of a video conference call, although eventually AI will figure out a solution to this too.

If you are an experienced cybersecurity professional and want a book to give your friends, family, and co-workers, this is a good place to start with their education. If you are new to the cybercriminal world, this book will show you its depths and darkest corners, and hopefully motivate you to use better and unique passwords and other protective techniques.

This is a great introduction to cybercriminals and how to protect yourself from being their next victim.

Book review: Good Intentions by Marisa Walz

book cover for Good IntentionsThis book takes on several tough subjects as part of its winding plot involving two terrible accidents on Valentine’s Day: one twin sister and one child are killed in two separate auto accidents. The surviving twin and the boy’s mother are brought together in grief, as their worlds fall apart. The twin runs her own event management business, and her husband has his own business too. The psycho drama of these three adults is woven expertly by the author as we watch their conflicts over loss and adjusting to various circumstances that I don’t want to reveal to spoil the plot. As someone who has lost an adult child, their grief journeys aren’t sugar-coated and seem very realistic and raw. And the strong ending is somewhat surprising but brings the novel to an appropriate close. Highly recommended.

Book review: Fidelity, an old book with a tale as old as time

Fidelity

For a book that is more than 100 years old, it is surprisingly modern and relevant. The story is universal — a woman breaks up a marriage with an affair, and the subsequent couple is run out of a small town in Iowa. The reaction to the town might be old-fashioned, but the raw human emotions, and the inner conflict of the characters is thoroughly modern. The couple can’t get married because the ex-wife doesn’t want to divorce her husband. “Some people, could go on with the life love had made after the love has gone,” says Ruth, the character at the center of this novel, which explores what happens when someone gets stuck emotionally, and how things might have turned out differently if Ruth had just fallen in love with someone else “like other girls in her crowd.” I think my only quibble is that the title of the book might be better with “resentment” because a lot of the emotional content which is brilliantly written is about what one character feels towards others.

I read the Belt Publishing version which has a wonderful introduction that ties its narrative to contemporary times.

Book review: Rich Mironov’s Money Stories

I have known Rich Mironov for more than two decades through numerous product management positions across the tech universe. His new book is “Money Stories: Communicating the Value of Product Work” and it is a great guidebook to what he calls members of the maker set and how they can talk to the other part of the company that doesn’t make anything but money (whom he collectively calls go-to-market execs), and hopefully profits to pay for all the fancy product stuff.

Money stories are good for providing the basis of why a company should build a product, creating a shared vocabulary that both makers and marketing execs can understand each other, and help rank development priorities and set strategies. And that is a good name for them, because making money is fundamental to a business (sometimes makers forget this), and decisions on knowing what to do something and when are often based on magical thinking, or emotions, or anything but money. These stories fall into six general patterns, such as upselling, boosting volume, reducing churn, acquiring new customers, entering a new market, or saving operational costs. For each pattern, he provides sample narratives, walks the reader through the underlying math, and calls out mistakes to avoid.

Mironov has seen it all, having been part of six Silicon Valley startups and consulted for hundreds of private clients. He now lives in Portugal, which I documented in that post. Money Stories is a fast read, but filled with lots of his wisdom. While the book is less than 90 pages, it is chock full of useful and actionable information. For example, “It’s much more productive to have a strategic portfolio-level argument about R&D resources and focus, rather than dragging executives through a 900-row spreadsheet.” And, “It is more important to agree on one simple calculation than throw punches,” presumably at the non-makers in the room.

One metric worth repeating is that “products need to earn six times their direct maker-team costs to fund the rest of the company.” That is the ultimate money story. “Either a product is earning its keep, or it is subject to summary execution.” Plain and simple. This is because the maker group has a heavy lift, and needs to support a constellation of services and specialities such as sales, marketing, finance, HR and so forth.

Much of his full-time experience has been with tech companies in the B2B space, where he is familiar with lengthy sales cycles, multiple people involved in purchase decisions, inability to quickly adapt pricing to market changes, or other sins. You would think this would harden a weaker person, but Mironov goes about his day with plenty of ironic humor (such as this post he wrote more than 20 years ago) and a can-do attitude that shows how he has survived and thrived in the product space.

Throughout the book are very handy “generic money story” diagrams that use simple math to calculate from three factors whether a new feature or product is going to worth the effort. It is important that this calculation is expressed as a range, to emphasize that we can’t accurately forecast the future (absent a working time machine, he hastens to add). “Money stories are communication tools, so should help drive a lot of conversations and raise interesting issues.” His last chapter reviews how to put these stories into practice, and some words on how AI fits into his worldview.

Book review: Infidelity Rules by Joelle Babula

This debut novel centers around the life and loves of Quinn, a sommelier for a trendy DC restaurant and a serial home-wrecker who likes to date married men. The dates are initially filled with passion that eventually cools as the men decide to end their affairs, or their marriages. The pairing of wine with relationship woes is a powerful narrative device as we are introduced to Quinn’s world, her female friends and family, and her coworkers. I found myself drawn in almost immediately to the plot and people, and the author does a great job of presenting both sides of Quinn’s latest dalliance with Marcus, who sweeps her off her feet until she meets up with his wife and hears her point of view of their relationship. The characters are well-drawn, the situations and circumstances feel very realistic, and the underlying humor and pathos makes for a compelling read, for readers of all genders. Highly recommended. Buy on Amazon here.