book reviews

The Beauty of Strange Things Done

My sister, Ellen Wild, has a mystery novel set in the Yukon, which will be released tomorrow. Check out the Dawson Daily, for the latest Yukon news, with a strange twist. And if you are a mystery lover, please watch the trailer for Strange Things Done.

Shawn Smallman, 2016

The frightening truth of Area 51

Dwight John Zimmerman has authored Area 51 in collaboration with artist Greg Scott, to tell the location of this key aeronautical research location in Groom Lake, Nevada. Of course, Area 51 is a favorite of UFO buffs and conspiracy theorists, and both these topics are covered (p. 3-8, 15, 51). These ideas, however, are not the core of this work of graphic non-fiction. Instead, this is a sweeping historical study, which describes the successes and failures that the U.S. intelligence and military services experienced while developing new aviation technologies at Area 51.

What is impressive is the quantity of material that Zimmerman is able to cover in 91 pages. Greg Scott’s realistic style works well with this content. Many of the black and white sketches remind one of period photographs. Scott is equally adept at capturing the look of advanced aircraft or a battle field. The text and images meld well together.

What most interested me about the work, however, was its extensive discussion of drones, particularly their early history (p. 42-50). Today global powers are discussing creating drone submarines, and even drone submarine hunters. In Northwest Pakistan and Yemen the United States has been carrying out an undeclared war. With a recent drone strike in Libya, the scale of the conflict seems to be expanding. This technology has developed with amazing speed.

As Zimmerman discusses, the United States invested vast amounts of time, funds and expertise into drone development in the early 1960s. For example, in 1964 the United States used drones to carry out “160 reconnaissance missions over China” (p. 44). Remarkably, in 1962 the United States began work on a Mach 3 drone, which proved unsuccessful (45). The scale of American investments is fascinating, but in the end Zimmerman argues that the U.S. failed, because the key technology to enable drones to work had not yet been developed.

By the 1980s, the situation had changed. Zimmerman describes (p. 65-73) how the rapid increase in microprocessor speeds permitted the U.S. air force to create a new generation of drones. The first drone was used in a combat theater in 1999 during the conflict over Kosovo. Scott’s images (p. 73) capture the rapid evolution in drones’ capabilities, from being tasked with aerial reconnaissance, to being used to accurately deliver laser guided bombs upon particular individuals. As Zimmerman makes clear, the U.S. is currently developing a host of new drones, which even include helicopters (p. 88).

In an earlier blog post I reviewed the book Ghost Fleet, which described a hypothetical future conflict between the United States and China, in which drones played a central and horrifying role. The groundwork for these robotic conflicts is being laid now. While cyberwarfare -such as the Stuxnet attack on Iran’s nuclear program- has attracted the attention of security theorists, I believe that drones merit equal attention or more. Few people are regularly being killed in cyber warfare, but this is not the case with drones. While the United States took an early and impressive lead, other countries are now rapidly developing these technologies, particularly in Asia. The area of the world that is now seeing the most sustained and significant growth in military spending is Asia, and these expenditures are largely being driven by the issue of the South China sea. If one were to see the emergence of a major conflict in which drones played a central role, this would certainly be the most likely location. If so, doubtless some of the drones involved will have been designed in Area 51.

Scott and Zimmerman’s book is well-written, beautifully illustrated, and compelling. Highly recommended for anyone interested in military technology and Area 51. The truth is out there.

Do you want to read about a true historical mystery? Please read my post about the ghost ship the Baltimore, and the mystery woman who was found aboard after the entire crew disappeared.

Shawn Smallman, 2016

Cypherpunks’ strange fight for freedom

Cypherpunks: Freedom and the Future of the Internet is a short, engaging and provocative look at surveillance and freedom on the internet. The book records a series of discussions between Assange and his co-authors (Jacob Applebaum, Andy Muller-Maguhn and Jeremie Zimmerman) on March 20, 2012 (while he was under house arrest in the UK), which was later edited for readability and coherence (p. 6). As a result, the reader feels as though they are eavesdropping on particularly interesting conversation in a pub, but a conversation by people who have great expertise in their fields. A front sheet on the book provides the essential context for this conversation: “What is a Cypherpunk? Cypherpunks advocate for the use of cryptography and similar methods as a away to achieve societal and political change. Founded in the early 1990s, the movement has been most active during the 1990s `cryptowars’ and following the 2011 internet spring.” The book reads as an introduction as much to the political philosophy of this group as it does to the technical issues involved in modern encryption debates. …

The Lights in the Tunnel

Ford’s book, The Lights in the Tunnel, is a bleak look at the future of global economies given an accelerating pace of automation. The book’s key idea is both clear and frightening: “The central thesis of this book is that, as technology accelerates, machine automation may ultimately penetrate the economy to the extent that wages no longer provide the bulk of consumers with adequate discretionary income and confidence in the future” (237). As a result, Ford suggests, governments will have to plan for radical rethink of the free market. …

Security, fear and Stuxnet

Roman Poroshyn’s brief book (156 pages) provides an excellent overview of Stuxnet within the larger context of cyber-warfare and espionage in the Middle East. Unlike another book on the same topic, Kim Zetter’s Countdown to Zero, it is not based on extensive interviews, nor does it focus in as great a depth upon the process through which the virus was investigated by global cyber security firms. Instead, with Stuxnet: the true story of Hunt and Evolution, Poroshyn tries to place Stuxnet into a broader context of espionage and cyber-warfare directed against not only Iran, but also other institutions in the Middle East, such as the Lebanese banking system. The book is an engaging read (despite the awkward wording of its subtitle), and Poroshyn shares a number of intriguing insights, of which the most interesting was that Stuxnet’s creators ultimately may have allowed it to be revealed to the world as an act of psychological warfare (33-35, 154-155). One of Poroshyn’s other arguments is that Stuxnet is only one chapter in a much longer struggle, which is convincing given his detailed analysis of successive software tools (Flame, Gauss, Narilam, and perhaps Stars) that Israel and the United States likely used against Iran and other regional actors.

One of the book’s strengths is its ability to convey the intelligence of the software design behind this particular cyberweapon. For example, Stuxnet entered into the Iranian nuclear enrichment network through USB sticks, because the network was air-gapped (lacked an internet connection) to the outside world. The level of deceit entailed is chilling: “After the third infection the original Stuxnet worm commits suicide. It deletes itself from the USB stick without leaving a trace” (18). Perhaps most impressive was the fact that it used the very tools for securing machines to infect them: “The perfect match for all of Stuxnet’s requirements is a computer scan process, generated by antivirus software. Stuxnet injects its clone into a variety of processes generated by anti-virus programs from BitDefender, Kaspersky, McAfee, Symantec, and many others” (19). The program was so effective that it briefly shut down the entire Iranian enrichment program (22). Of course, the Iranians ultimately were able to return to significant production. What is impressive, however, was that it achieved this goals which would have been difficult to achieve even with a conventional airstrike against such a hardened site as the Iranian enrichment facility. It also had dangerous implications: “Russia, which is involved in the reconstruction of the Iranian nuclear reactor in Busher, immediately accused Stuxnet of problems associated with the reactor’s reconstruction, and blamed Stuxnet for all delays” (37). There seems to be little evidence for this allegation, but once the attack is made, other actors may also view themselves as being threatened (or that the attack represents a convenient excuse).

There is reason to believe, as Poroshyn suggests, that there are other versions of this particular weapon in existence, only biding their time to be unleashed (53). This book is currently in its third edition. It will be interesting to learn what has happened when the fourth edition is released.

If you are interested in cyber-warfare you might want to read my review of the novel Ghost Fleet.

Shawn Smallman, 2016

Book Review of Lords of Secrecy

Scott Horton’s book Lords of Secrecy is a passionate, angry, well-written and disturbing look at how U.S. national security agencies have undermined congressional oversight, and consistently violated the law. At the core, this book argues that the growth of the national security bureaucracy has outgrown the ability of Congress to provide oversight, and fundamentally threatens democracy. In the aftermath of the appalling and evil attacks in Paris last week, there is currently a clear need for effective intelligence agencies. Horton’s work, however, raises questions about the autonomy of these organizations, and the risks that their work may entail by pervading secrecy throughout our political culture. …

Book Review of The Dark Net

The Dark Web first came to widespread notice with the publicity surrounding the arrest of the founder of Silk Road, an anonymous online market place. The Dark Web itself is subject to multiple definitions, although the most common is that component of the web that cannot be accessed by standard browsers. To access this part of the web, one must use a specifically designed browser, such as TOR. In his new book, the Dark Net, Jamie Bartlett takes a more expansive approach to the web, which he conceives off as the underworld of the internet, beyond the reach of the government and the authorities. …

A Book Review of Smarter than Us

Stuart Armstrong’s Smarter than Us is an exceptionally brief book of barely 54 pages, including the bibliography. It is not based on fieldwork, the references are few, and it can be easily read in two hours. The entire work reads as a series of thought experiments regarding the future of artificial intelligence (AI). It is also as disturbing as it is insightful. …

Security and a strange cyberattack

The Natanz nuclear facility in Iran. This photo was taken by Hamed Saber, and was posted to http://www.flickr.com/photos/hamed/237790717, and downloaded from Wikipedia Commons
The Natanz nuclear facility in Iran. This photo was taken by Hamed Saber, and was posted to http://www.flickr.com/photos/hamed/237790717. I downloaded the image from Wikipedia Commons

In Countdown to Zero Kim Zetter describes a 2010 cyberattack on the Iranian nuclear program. In a brilliant piece of computer engineering, the control units for centrifuges that enriched uranium were forced to slow and fail. The attack was so carefully planned that even after it began the Iranians were initially unable to diagnose the problem. The book itself is well written and carefully researched. Zetter did extensive interviews in the cybersecurity community, to understand how people identified and studied this particular worm. This work is detailed in extensive footnotes, which will lead a curious reader down interesting paths. Zetter carefully describes the technical issues involved in the attack, without letting this detail impede the storyline. Overall, this is a masterful work of narrative non-fiction, which engages the reader in a highly complex topic. …

In honor of Halloween: A Book Review of Haunted Girl

Every Halloween I look at an international mystery or folklore. This year, I’ll review a book by Laurie Glenn Norris and

Leon Trotsky spent time incarcerated in Amherst, Nova Scotia after World War One.
Leon Trotsky spent time incarcerated in Amherst, Nova Scotia after World War One. Image from Wikimedia Commons.

Barbara Thompson titled Haunted Girl: Esther Cox and the Great Amherst Mystery. The book examines events surrounding one of the most famous poltergeist cases in Canadian history, which took place from 1878 to 1879. As the authors note, these events have been the subject of a 19th century non-fiction book, a novel, a mural, a play and a doll. At the core of this tradition is the biography of Esther Cox, who was an 18 year old when she claimed to experience a series of terrifying incidents, which included moving furniture, bodily wounds, and spectral writing on a bedroom wall.

Norris and Thompson place these events into the context of Nova Scotia at the time, and Esther Cox’s own troubled personal life. The work is scholarly, and the authors have investigated all aspects of Esther’s world in impressive detail. Still, the authors never wander from their focus on Esther herself, which makes for an engaging work. The book also benefits from a plethora of photographs, which allow us to visualize key actors and locations. Having written my own book on Canadian folklore (Dangerous Spirits, which is available in the US and in Canada) I can imagine the amount of time that these photographs must have required to locate. …

Privacy & Cookies: This site uses cookies. See our Privacy Policy for details. By continuing to use this website, you agree to their use. If you do not consent, click here to opt out of Google Analytics.