Thursday, December 20, 2012

Another Cyber-Crime Thriller

Map of the (then) East German Island of Ruegen, setting of World of Mirrors
You might want to take a look at World of Mirrors, authored by Judith Copek.  Published as both a trade paperback and an ebook, World of Mirrors is another cybercrime thriller from Wings ePress. 


World of Mirrors is set on an island off the Baltic coast in the former DDR, and the year is 1990, the “time of the turn.” The Berlin wall has crumbled, but Germany is not yet reunified.   Against the seductive decadence of an old resort with its classic sailboats, nude beaches and crumbling casinos, Zara Gray, a consultant to high tech firms, and T.K. Drummond, a man who finds people and fixes situations, must track down an American software thief before he can fence a stolen copy of his company’s bleeding-edge new software.
 Zara narrates the story as she fights the fear that their mission is jinxed from the beginning.  Bad decisions and chilling discoveries threaten to sabotage the project.  The situation further unravels during a sailing weekend, and turns deadly at a Midsummer Festival.  Trapped in a matrix of betrayal, Zara and T.K. must rely on two unlikely people to help them escape the island and in a final, desperate gambit to save the software, Zara must perform her own dangerous treachery.  

There is plenty of suspense and cyber-derring-do (isn't that the best kind)? and a look at East Germany the year after the wall came down, a  World of Mirrors in the words of Marcus Wolf, the former East German spymaster.  Available from the publisher or Amazon.  


E-ISBN:                          978-1-61309-073-2
POD-ISBN:                     978-1-61309-929-2   1613099290  (ASIS) 
    



Tuesday, September 11, 2012

Read the Infowar Blog

Here is the link. Infowar Blog Lots of late-breaking news, etc.

 Assume everyone who can read has learned of the attack on GoDaddy yesterday.  The more things change, the more they stay the same.


Saturday, August 4, 2012

Yes, Sir! Senator!


The Senate has blocked an important cybersecurity bill that would have required business and industry to beef up their security standards, especially in vulnerable infrastructures like dams, transportation and power grids.  If information warfare ever breaks out, and most experts think this is just a matter of time, it will affect all businesses, and then we will have to listen to them howl about the money they are losing.  Yet, the U.S, Chamber of Commerce screamed that the legislation would be “too burdensome” for corporations. 

From my years in IT, I learned that business never wants to spend money that won’t immediately bring in more money, and that the short term always trumps the long term.   Most CEO’s understand zilch about their vulnerability in the area of cybersecurity  and how real the threat of information warfare is.  They think the IT department, well, they should serve sales and marketing and sure, keep our data safe.  

Ask yourself how many companies have had credit card and other information stolen.  Hasn’t that been rather costly?  Wouldn’t it have been better to beef up security rather than alienate customers and suffer all the bad publicity?  Can’t they see beyond their noses?

I guess not.  For a detailed look at the Senate’s short-sightedness, here is the  link from the New York Times:

Saturday, July 28, 2012

CyberSecurity: people just don't get it!

Gaaa!  After reading about the Olympic grand slam opening last night, I caught sight of a NY Times article about taking the teeth out of a CyberSecurity bill because it would be too hard (read expensive), for businesses to comply with.  Business would be the first to scream and rant if a cyber war broke out and they were brought down by infrastructure problems or a ripped-to-shreds economy.

I worked in IT for 20+ years, and believe me, business is always dragging its security heels.  I had to scream loud and long before the customer service people stopped leaving orders by the fax and copy machines, orders with the customers' credit card numbers and expiration dates.  I had to beg for a shredder for confidential information.  I had to preach and tear my hair before everyone understood that by law you could not put the credit card CVVC number on an electronic file.  I cannot tell you  how many forms used to ask for that number.  Duh!  Business is in business to do business and as the old saying goes, the devil take the hindmost.  Credit card processors are hide bound and dragged their feet for as long as possible before the fines outweighed the cost of cleaning up their act.

Business will never implement security measures because it's always more important to please the marketing department who comes up with some meatball idea that needs implementation yesterday!  Executives are mostly focused on sales, not the security infrastructure.  Someone has to mind the CyberSecurity store and right now it's looking like that someone is no one.

When the cyber war breaks out, don't blame me and don't blame your president.  Blame those who didn't want to spend a few bucks to beef up their systems:  electric grids, transportation, nuclear power plants, all those pieces of our infrastructure that may be vulnerable to cyber-attacks.  Brother can you spare a dime?  

Friday, July 27, 2012

Cyberattacks Increase in U.S.

Targeting our infrastructure, cyberattacks against the U. S. have risen 17-fold in the past few years (2009-2011).  Read all about it here:  Cyberattacks on Rise in U.S.


Cyberattacks are the theme, framing the plot in The Shadow Warriors, first pubbed in 2001.  Was I ahead of the curve or not?  Falling on deaf ears, of course.  Maybe I should have sent the NSA and the White House copies of the book?  Will it become a best seller if the attacks are not thwarted on some occasion?  I would not wish that on anyone, the attacks, that is, not becoming a best seller.  


I did scads of research, and considered myself almost an expert at one time.  A few years ago I threw out all my  carefully collected documents because everything was so out of date.  


BTW, I had no idea that WE created Stuxnet.  Is that a fact?  I read it recently, maybe in Wired Magazine, my go-to place for cyber lore.  We haven't acknowledged it, if true.  What would the Skunkworks think?  Writing my techno-thriller was such fun.  Along with World of Mirrors which had a different kind of technology at its heart.   It  would be fun to be a mouse in the wainstcotting (assuming there might be wainscotting) at the Aspen Institute. 

Tuesday, June 12, 2012

Danger Room Blog

I thought that my readers who are also technology geeks might  enjoy knowing about Wired Magazine's blog, Danger Room.  It pays to keep informed about practically everything these days.   

Here is the link.Danger Room.  Is has sort of dystopian ring, doesn't it?

 BTW,  if you're up for international intrigue and technological history, my novel, World of Mirrors is out.   It can be ordered from the publisher's web site in print or as an ebook.  Still waiting for Bowker to  register the ISBN.  Not everything happens quickly in e-publishing.  Here is the link to the novel, and you can find out whether it's your cuppa tea.  Link to World of Mirrors publisher


The story is set on an island off the Baltic coast in the former DDR, and the year is 1990, the “time of the turn.” The Berlin wall has crumbled, but Germany is not yet reunified.   Against the seductive decadence of an old resort with its classic sailboats, nude beaches and crumbling casinos, Zara Gray, a consultant to high tech firms, and T.K. Drummond, a man who finds people and fixes situations, must track down an American software thief before he can fence a stolen copy of his company’s bleeding-edge new software.
Zara narrates the story as she fights the fear that their mission is jinxed from the beginning.  Bad decisions and chilling discoveries threaten to sabotage the project.  The situation further unravels during a sailing weekend, and turns deadly at a Midsummer Festival.  Trapped in a matrix of betrayal, Zara and T.K. must rely on two unlikely people to help them escape the island and in a final, desperate gambit to save the software, Zara must perform her own dangerous treachery.    

Kinda like a caper with an international cast of miscreants.  :)    

Saturday, May 19, 2012

World of Mirrors

At long last, I have a new novel coming out. next month.  No date yet. 



World of Mirrors is set on an island off the Baltic coast in the former DDR, and the year is 1990, the “time of the turn.” The Berlin wall has crumbled, but Germany is not yet reunified.   Against the seductive decadence of an old resort with its classic sailboats, nude beaches and crumbling casinos, Zara Gray, a consultant to high tech firms, and T.K. Drummond, a man who finds people and fixes situations, must track down an American software thief before he can fence a stolen copy of his company’s bleeding-edge new software.
 Zara narrates the story as she fights the fear that their mission is jinxed from the beginning.  Bad decisions and chilling discoveries threaten to sabotage the project.  The situation further unravels during a sailing weekend, and turns deadly at a Midsummer Festival.  Trapped in a matrix of betrayal, Zara and T.K. must rely on two unlikely people to help them escape the island and in a final, desperate gambit to save the software, Zara must perform her own dangerous treachery.       

Like The Shadow Warriors,  technology drives the plot.  There is no Infowar, but there are lots of international bad guys who want to get their grubby hands on this intelligent software.  The Americans are by no means the good guys either.  No one come out unscathed.  Sort of like real life!  

As the details become available, I'll post them for you.   

Tuesday, April 10, 2012

Cassandra Syndrome

Counter-terrorism czar Richard Clarke discusses cyber war in this month's (April 2012) Smithsonian Magazine. This story  sounds so much like The Shadow Warriors (the Stuxnet virus) that I too feel like Cassandra, for having first written about Info War after hitting upon the idea for the "Warriors" from Paul Strassman in an article way back in 1995.  Can you believe it? 

I recommend anyone interested in the topic of cyber or info war to head to your nearest library and sit down with the April Smithsonian Magazine.  According to Clarke, the U.S. can go on the offensive but we are virtually (!) helpless against an offense.  Where are Wayne, Christof, Kathy Chang and even Emma  (my characters) when we need their expertise so badly?  Bring on the Skunk Works! 

Lots of questions, few answers, but Richard Clarke has his ideas about Stuxnet.  Endlessly fascinating. 

The Shadow Warriors  hit the nail on the head.  Read about it now, before the Cyber War brings down your computers. 

Monday, March 5, 2012

Day Two of the Smashword Giveaway



The Shadow Warriors is free this week on Smashwords


First, a quick synopsis of The Shadow Warriors:

Emma Lee Davis must delve deep into the past to find a weapon to end the Infowar that threatens to de-stabilize a computer-dependent global economy.  Project manager of a  tiny firm of cyber-sleuths, Emma scrambles to make the connections between a body washing up on a beach in Singapore, and the technical derring-do at a German university.
She tracks a desperate hacker planning a unique software auction, a determined entrepreneur who will stop at nothing to acquire  ‘bleeding edge’ software and  tumbles onto a new generation of terrorists with their own agenda. 

Emma and her colleagues are sucked into a vortex of lies, spies, and betrayals and ultimately into the sleaze and paranoia of Berlin in the months before the wall comes down. Not quite glamorous, sometimes nerdy, always nosy, irreverent and intuitive, Emma becomes the reluctant sleuth. She narrates the story as she scrambles to manage a software project and her complicated love life, while puzzling over the paradox, “if our mission is to stop computer crime, why are we abetting it?”


This is still as relevant (if not more so) than when I started writing it in the nineties.   Here is how to order The Shadow Warriors - - FREE!  Free Book!

I hope you enjoy it.  If you do, please let me (and your friends, know).




Friday, February 3, 2012

Institute For Advanced Computing

The Denizens of the Institute ate pizza with a knife and fork
When I began the novel, The Shadow Warriors, I knew I wanted Goettingen to be a big part of the book, and I knew technology was a huge part of the story.  My in-laws lived in Goettingen on the Prinzenstrasse on the 4th floor of an office building.  I went through the phone book to make sure there was not already a computer institute.  Whew!  There was not.  I came up with the name "Institute for Advanced Computing" and created Dr. Mittelstadt, Jacob Loose, Marcus, Christof, Marlies and Verena.  All the folks who worked there.

Did you catch my beginning author boo-boo.  Marcus and Marlies.  Never have character names that are too similiar.

Sunday, January 29, 2012

Recipes from the Shadow Warriors

The Shadow Warriors is certainly NOT a cozy mystery, so why are there recipes?  Because, that's why, and here they are for your delectation.  Emma is the protagonist, the heroine if you will, although sometimes she is very unheroic.



Emma bought a well-thumbed copy of Elizabeth Schuler’s German Cookery at a rummage sale in Wisconsin, and hoped the recipe she found in it was as tasty as Frau Eisenach’s.  Pflaumenkuchen. Since Emma thought it was, she wanted to share that recipe and a couple of others with you.]

Plum Tart
1 recipe sweet mellow dough (see below)
2 lbs. Prune plums (sometimes called Italian prune plums)
¾ cup sugar
1 tsp. cinnamon
½ cup chopped almonds.
Prepare dough (see following recipe) and line a greased cake tin with it (Emma used a 10 inch fluted tart pan with a removable bottom). Pit the plums and arrange in a circle on the dough. Sprinkle with sugar, cinnamon, and almonds. Bake in a fairly hot (375º) oven for 30 minutes.

Mellow Dough, Sweet

2 cups flour
1 stick (¼ lb.) butter
½ cup sugar
1 egg
Pinch of salt
1 tsp. Baking powder
Mix all ingredients and, on a breadboard, knead to a supple dough. Roll out (Emma spreads it right into the pan with her fingers) and line a tart pan. Due to high butter content, chill a bit before baking.

***
Frau Eisenach finds a better selection of smoked meats in the Göttingen markets than Emma finds Stateside. Frau Eisenach’s recipe for Kassler calls for a smoked pork rib roast; however, Emma feels fortunate when she can find smoked pork chops. When she does, she makes--

Kassler Rippenspeer.
4 –6 smoked pork chops
1 onion, chopped 
1 tomato, chopped
2 ribs of celery, sliced thin
A half dozen mushrooms (thinly sliced)
1 clove garlic, chopped
1 carrot, chopped
Freshly ground pepper
Salt
2 T. canola oil or 1 T. oil and 1 T. butter or lard

In a skillet large enough to hold the meat in one layer, brown chops in oil. Remove from pan and add vegetables. Cook and stir until onion is wilted and transparent. Season with salt and pepper to taste. Place chops on bed of vegetables and add 1 cup liquid. Emma uses a mixture of dry white whine and beef broth.) Cover and bake for one hour a 325º. Serve with mashed potatoes and a salad.
***
Like her mother and grandmother before her, Emma seldom cooks straight from a recipe. The quantity of the ingredients can be adjusted according to what’s on hand. A few chopped mushrooms could be added along with the tomatoes to:

Frau Eisenach’s Hoppel-Poppel
For 2 persons:
2-3 slices of bacon cut into ¼ inch pieces
1 small boiled potato, peeled and cut into ¼ inch dice
¼ onion, minced
4 eggs, beaten with 1 T. water
2 T. chopped chives (fresh are best)
1 T. butter
salt and pepper
½ tomato, seeded and juiced and chopped into ¼ inch dice

Brown the bacon in a heavy skillet. Emma likes the big cast iron skillets her grandmother used. Heavy?  Yes, but hoisting them around the kitchen does tone the arm muscles. Remove the bacon and cook the onion and potato in the remaining fat. When the potato is slightly browned, add the chopped tomato. Cook and stir for a minute or two, then add the butter, eggs and chives. Continue to cook and stir over low heat until the eggs are cooked. Season with salt and pepper. Serve right from the skillet.

***
Renate Mittelstadt made a delicious fruit salad for Verena’s party at the Ballhaus. When Emma asked why it tasted so special, Renate shared her secret: two tablespoons of Apfel Korn (a mild apple liqueur). Kirshwasser, Apple Jack, Calvados, or even rum can be used as a substitute.

Renate’s Fruit Salad

Use some or all of the fruits listed: 
Raspberries
Strawberries
Blueberries
Peaches (skin removed)
Nectarines (skin removed)
Bananas
Grapes
Apples (peeled)
Oranges
Dried Cranberries (for color in winter)
Melons
A little sugar depending on the sourness of the fruit
2 T. Apfel Korn or a substitute
Emma likes to add a few chopped pecans or walnuts. If she feels industrious, she toasts the nuts first. The salad can be made with as few as three fruits. Try to vary the colors. Serve plain or with a dab of whipped cream.

***

Goulash Soup is found is many restaurants in Germany and Austria. Emma eats it summer and winter, but she’s more likely to cook up a pot in winter. The recipe below serves 3-4, but can be doubled.

Goulash Soup
1 pound boneless sirloin or top round steak
2 T. vegetable oil (Emma likes Canola)
2 cups finely chopped onions
2 t. finely minced garlic
1 red or green pepper, diced
1 carrot, diced
2 boiling potatoes, peeled and diced
1 t. caraway seeds
2 cups fresh or canned red tomatoes
1 T. sweet or hot Hungarian paprika (Emma uses some of both)
1 bay leaf (optional)
Salt and pepper
3 cups beef broth
Sour cream
1. Trim the meet and cut into half-inch cubes
2. Heat the oil in a large heavy saucepan. Add meat and brown.
3. Add the onions, garlic, green pepper and carrot. Cook stirring, for a few minutes. Add all the seasonings. Add the tomatoes and potatoes. Cook, stirring occasionally for about one hour.
Place a dollop of sour cream on each serving. Serve with a good rye bread and a cucumber salad.

Guten Appetit!

Wednesday, January 25, 2012

Tangled Up In My Technology Underwear

I'm changing from an email account I've had since God was a boy. 8 pages of web sites. Merging identities, visiting websites and hunting for where to change the information. Makes one appreciate a well-designed site and curse others. Often Fortune 500 sites are the worst.

So far I am only locked out of two sites. It's a wonder it's not two dozen. Merging the blog identities is today's project. I have given myself a year to complete this whole project. If that long enough? Complications abound.

Ye gods, I need a project plan! That's it. What a crazy world we live in.

Makes The Shadow Warriors look like a Sunday school picnic. No! They're still mean and lean and slinking around in cyberspace. OMG!