What would happen if a nation-state really
did launch a serious cyber-attack against the United States, perhaps as part of
something larger?
Who will step up to save us – the government, big business, or maybe a team of superheroes?
Or maybe a few ordinary people. Because real superheroes are ordinary people who step up when called. Even when they don’t want to. A new book explores what could happen when things go deadly wrong.
D.
Greg Scott , with 40 years of IT experience under his belt, including 15 years
building firewalls and handling cybersecurity for dozens of organizations and
thousands of people, delivers a fascinating look at what our nation could
experience in the near future – unless we take steps to avoid a cyber disaster
– with his newest novel, Virus Bomb (Morgan James Publishing).
So
much can go wrong today – hacked files, financial theft, identity fraud, data
breaches, ransomware. And then there is the big stuff.
In
his book for nail-biting adrenaline junkies, Scott dissects the technological
details of an all-too-familiar cyberattack, and the all-too-familiar reaction
from people who should know better. But this time, the country will pay dearly
unless a few ordinary people step up. Scott hitches the imagination to a rocket
as he launches the reader into the middle of a potentially devastating chain of
events.
“Virus Bomb (www.dgregscott.com.) hits home because
the real world is plagued with daily data breach headlines,” asserts Scott. “And
the public rarely learns the root cause behind these disasters. If we care about
winning against the armies of attackers out there, we need to lift the fog
around how these attacks unfold.”
Drawing on
real news accounts and first-hand research, which included listening to hours
of cockpit recordings, interviewing law enforcement professionals, studying
historical events, and learning about the practice of the Muslim faith, Scott
produced an authentic novel that will scare people every time they visit a
shopping mall. He combines his deep tech knowledge with a flair for action to
deliver a roller-coaster ride.
Virus Bomb draws in a
diverse audience of aviation enthusiasts, medical professionals, leaders in
business and government, law enforcement officials, penetration testers, and
everyday people. Using decades of experience in the IT industry, Scott
transports the reader to the brink of the largest cyber-attack in history,
where the fate of thousands rests in the hands of “Jerry,” the IT guy.
Here
is an interview with Scott, a client for the public relations firm that I work
for:
1.
Greg, what
inspired you to pen Virus Bomb? While writing Bullseye Breach,
I saw a small story on a back page in the St. Paul Pioneer Press about somebody
who committed suicide after the Target data breach. That drove home for me that
the stakes for cyberattacks are higher than just money. We’re all
interconnected these days and malicious online interactions really do
contribute to people dying. And, so with Virus Bomb, I wanted to combine
several elements. How and why does a teenager who grew up in the United States
decide to join an overseas terrorist group? After the United States launched a
software weapon against a hostile country, what happens when that country turns
it back on us? At the grass roots, what happens when we purposely ignore the
threats all around us because they come with technology words nobody
understands? And in our interconnected world, how do ordinary people influence
all this?
2.
Could the events
in Virus Bomb really happen? Yes. Many events in Virus Bomb
have already happened in the real world.
Consider the real-world cyberattack against the United States Office of Personnel Management (OPM) that made headlines in 2015. OPM allowed the Chinese to steal a roster and other information about every single US Government employee. OPM also allowed the Chinese to steal detailed information everyone who applied for a security clearance shared with the US Government. Imagine the spear phishing scams, blackmail, and other ways a hostile foreign power could exploit that information.
Or consider the real-world 2008-2009 cyberattack the United States and Israel deny launching against the Iranians to slow Iran’s nuclear ambitions. Iran has had 10 years to study that code and use it against us.
Think about manipulating high government officials or other influential people into doing something stupid. In the real world during the 2016 election cycle, former Whitehouse Chief to Staff, John Podesta fell for a phishing attack and gave away his email password to the Russians, and the Democrats allowed the Russians to steal their private emails.
Large-scale attacks are so common these days, they barely last one news cycle. Search for any Fortune 500 company name and “cyberattack” and the odds of finding a real-world attack story are better than even.
Readers will find plenty of excitement in Virus Bomb. But no Hollywood hackers. Nobody needs to suspend disbelief with this story.
Consider the real-world cyberattack against the United States Office of Personnel Management (OPM) that made headlines in 2015. OPM allowed the Chinese to steal a roster and other information about every single US Government employee. OPM also allowed the Chinese to steal detailed information everyone who applied for a security clearance shared with the US Government. Imagine the spear phishing scams, blackmail, and other ways a hostile foreign power could exploit that information.
Or consider the real-world 2008-2009 cyberattack the United States and Israel deny launching against the Iranians to slow Iran’s nuclear ambitions. Iran has had 10 years to study that code and use it against us.
Think about manipulating high government officials or other influential people into doing something stupid. In the real world during the 2016 election cycle, former Whitehouse Chief to Staff, John Podesta fell for a phishing attack and gave away his email password to the Russians, and the Democrats allowed the Russians to steal their private emails.
Large-scale attacks are so common these days, they barely last one news cycle. Search for any Fortune 500 company name and “cyberattack” and the odds of finding a real-world attack story are better than even.
Readers will find plenty of excitement in Virus Bomb. But no Hollywood hackers. Nobody needs to suspend disbelief with this story.
3.
Is your book a
warning to America that our present defenses against a deadly cyber-attack are
woeful?
Yes, but it’s more. A friend at Morgan James Publishing first presented these
goals and I’m adopting them as my own. I also want to educate, inspire, and
entertain people. And we need to pull our heads out the sand and take the kick
me signs off our other sides.
4.
How did you go
about researching the technical aspects of airplanes, law enforcement, the
Muslim faith, and other central parts of your book? I spent lots of late
nights reading and listening to lots of material and talking to lots of people.
Jerry Barkley spent a couple hours in the air, but it took me months to get him
safely on the ground. I mentioned some of it in my acknowledgements; I had to
find a good airport for him to land, I had to dig through Cessna documentation
to figure out those instruments, and in airports, I buttonholed everyone I
could find in a uniform when I was traveling for my job to try and figure out
how the radio worked. I poured time and homework into every element of Virus
Bomb because I wanted to get it right. I read lots of Muslim history around
what Christians did during the Crusades and even while Columbus was discovering
the new world. The backstories behind many of Jerry Barkley’s interactions with
the FBI are autobiographical. As are many of the cyber elements and characters.
Virus Bomb is fiction, but I want it to be credible fiction.
5.
Tell us about the
lead character, Jerry Barkley. Who is he? He’s a middle-aged, bald-headed
white guy from Minnesota. He lives in a suburb with his wife of 30+ years, an
adult daughter, and her two boys. He spent the first half of his career trying
the climb the same corporate ladder as every other middle-aged suburban white
guy. That didn’t work out well, and now he’s trying to get Barkly IT Services
off the ground. He’s been trying to get Barkley IT Services off the ground for
more than twenty years. Some call him stubborn. He likes to think of it as
persistent. He respects authority, but only to a point. He has a quick wit, a
keen mind, and never enough money. But even if he had unlimited money,
splurging for Jerry Barkley means buying a new washing machine instead of
fixing the old one again.
6.
Your book is both
entertaining and thrilling – as well as a bit of a warning and prescriptive text. Why are we fascinated with the big events
that could destroy cities and kill millions? I don’t know – I’m just a bald guy
from Minnesota. But when I look back to, say, the 1991 Gulf War, I spent money
to bring cable TV into my house so I could watch live CNN coverage. I was busy
at work during the 9/11 incident, but I spent every possible moment soaking up
details and I still remember where I was and what I was doing. I also remember
being glued to the news during the 2003 shock and awe campaign. I share the
same fascination with big events, but I need to think more about why. It might
be because I worry those events will turn my comfortable world upside-down.
7.
Your book seems to
demonstrate how ordinary people step up and impact the world. How can we encourage others to see themselves
as being potential heroes? Real superheroes are ordinary people who step up, but
many people want somebody else to step up. Virus Bomb has a character
like that, and nothing and nobody will change her mind. How do we convince a
skeptical business manager they’re an unwitting global catalyst for
catastrophe?
In the real world, I used to play church-league, coed softball. I was never much of a softball player, and one time, a frustrated team coach tried to teach me about situational awareness. Know how many outs, where the baserunners are, the ball/strike count, and dozens of other factors. Always keep abreast of the game situation and how it affects me playing my position. This didn’t help my hitting, catching, or throwing, but hopefully helped me make smarter game decisions. This applies outside sports. They say when a bird lands on a power line in Canada, people in Mississippi feel it. In our interconnected world, somebody in North Korea can shut down a careless Fortune 500 movie studio with a few keystrokes. Or somebody in Ukraine can steal millions of credit card numbers from Minneapolis based Target Corp. by compromising an obsolete computer in an HVAC company in Pennsylvania.
We encourage others to see themselves as potential heroes by teaching global situational awareness. Start by reading Virus Bomb and Bullseye Breach.
In the real world, I used to play church-league, coed softball. I was never much of a softball player, and one time, a frustrated team coach tried to teach me about situational awareness. Know how many outs, where the baserunners are, the ball/strike count, and dozens of other factors. Always keep abreast of the game situation and how it affects me playing my position. This didn’t help my hitting, catching, or throwing, but hopefully helped me make smarter game decisions. This applies outside sports. They say when a bird lands on a power line in Canada, people in Mississippi feel it. In our interconnected world, somebody in North Korea can shut down a careless Fortune 500 movie studio with a few keystrokes. Or somebody in Ukraine can steal millions of credit card numbers from Minneapolis based Target Corp. by compromising an obsolete computer in an HVAC company in Pennsylvania.
We encourage others to see themselves as potential heroes by teaching global situational awareness. Start by reading Virus Bomb and Bullseye Breach.
8.
You say that the
bad guys are good at collaborating and sharing secrets on how to hack the
Internet’s vulnerable spots. Don’t the
good guys work together, too? Not as well as we should. Look no further
than the recent Capital One incident as a possible Exhibit A. Although we
suspect somebody used a web application firewall as a weapon in a server-side
request forgery attack, the specific exploit the attacker used to penetrate
that network is still not public. Equifax offers another example. It took a
Congressional investigation to produce a report on what went wrong. Don’t
believe me? Pick any Fortune 500 company at random, call the security
department, and ask for details on how it protects itself. Good luck getting an
answer.
9.
How can digital
attacks on data get weaponized to the point terrorists can expose us to
dangerous biological, chemical or traditional threats? Back in 2008, the
United States and Israel officially did not collaborate to sabotage the
programmable logic controllers (PLCs) that controlled the Iranian centrifuges
they used to refine Uranium. Somebody – the United States and Israel deny they
were involved – sabotaged the software in those PLCs to spin the centrifuges
faster than their rated capacity. This destroyed lots of centrifuges. Experts
estimated this set the program back buy two years. All it takes is for software
to open or close the wrong valve at the wrong time and somebody could blow up a
nuclear power plant. Or worse. Or beyond direct targets, an attacker could
penetrate, say, the transport industry, find details about shipments of
dangerous materials, and go after those.
10.
Do criminals and
terrorists use the same tactics as nations do in the e-war battles fought
online?
Yes. The only difference is, nations have more people doing more of it.
11.
Should we trust
Amazon, Google, Facebook and Microsoft to protect us? About as much as
we should trust Bernie Madoff with our investments.
12.
What trends do you
see formulating in IT and cyber-security? More consolidation into massive
datacenters as everyone moves into the cloud. Tighter and tighter connectivity,
with associated applications on top of that as we continue wiring the world
with fiber. More sensational headlines about data breaches, more hysteria. But
it will eventually improve as the technology and our attitudes mature, just like
with earlier technology revolutions.
13.
Do we sometimes
need fiction to present the truth to ourselves? Yes. We’ve been
using fiction to present truth for thousands of years.
14.
Why do so many
companies and government agencies proclaim they’ll do more to take
cybersecurity threats seriously – and then huge data break-ins are discovered? Too many business
and political leaders consider IT as an expense instead of an asset. Until that
attitude changes, the empty proclamations will continue. Many busy executives
pay lip service to cybersecurity, but delegate it all to the IT Department with
the mandate to do more with less. When Home Depot lost 56 million customer
credit card numbers back in 2014, the Home Depot execs summed it up best when
they said, “We sell hammers.” Other busy
execs get paranoid. They spend lots of money for security theater with
checklist audits from third party companies, but never educate themselves on
the fundamentals behind those audits. Proclamations are easy. Practicing due
diligence, investing, and making informed decisions is hard work. So is
leadership. And industry and government need leadership to tackle this problem.
Somebody needs to lead the way into adopting open.
DON”T MISS THESE!!!
The Book Marketing Strategies
Of Best-Sellers
How Authors Can Sell More Books
No. 1 Book Publicity Resource:
2019 Toolkit For Authors -- FREE
How Authors Get Bulk Sales Now
Brian Feinblum’s insightful
views, provocative opinions, and interesting ideas expressed in this terrific
blog are his alone and not that of his employer or anyone else. You can – and
should -- follow him on Twitter @theprexpert and email him at
brianfeinblum@gmail.com. He feels much more important when discussed in the
third-person. This is copyrighted by BookMarketingBuzzBlog ©2019. Born and
raised in Brooklyn, he now resides in Westchester. His writings are often
featured in The Writer and IBPA’s Independent. This was named one of the
best book marketing blogs by Book Baby
http://blog.bookbaby.com/2013/09/the-best-book-marketing-blogs and recognized
by Feedspot in 2018 as one of the top book marketing blogs. Also named by
WinningWriters.com as a "best resource.” He recently hosted a panel on
book publicity for Book Expo America.
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.