Used price: $2.49
Several years ago, in his bestselling novel Debt of Honor, Tom Clancy scratched the surface of economic information warfare. In Pearl Harbor.com, Winn Schwartau takes the reader through a weeks-long attack against the national information infrastructure.
However, the book is not only a thirller. It is throught-provoking in a number of ways, exploring the true psyche of the hacker community; the dependance that Western Civilization now has on Computers; and the spectre of "what if we had to live without it."
This book is must-reading for anyone who has anything to do with information security, homeland defense, or economic security.
Schwartau's latest book is not only a thriller, but is a wake-up call that clearly shows the dangers of ignoring our critical information systems.
Used price: $7.70
Buy one from zShops for: $6.50
List price: $16.95 (that's 30% off!)
Used price: $1.49
Buy one from zShops for: $1.75
Used price: $1.72
Collectible price: $6.35
Buy one from zShops for: $3.74
Used price: $1.40
Buy one from zShops for: $2.99
The author's disconnect with technology is demonstrated in his discussion of the Clipper chip. Clipper is now installed in most stand-alone voice encryptors that are sold in the US. At the beginning of each phone call a new session key is shared between the two callers. It is not practical to find this session key by guessing but a separately encrypted version is sent along with the conversation. The session key can be discovered by government agencies through appropriate procedures. The author's discussion of this states that a NSA proposal "...would add a device called the clipper chip to every telephone or computer manufactured in the United States." For most phones that use analog transmission of voice this would clearly make no sense. Apparently the author missed the issue entirely.
In places the book becomes more of a political platform than a balanced discussion. After condemning filtering programs that block access to porn sites he states that "The fun for those who devote themselves to censorship is the daily discovery of new sites that they can condemn and prohibit"
Even commonly known security details are missed. In a discussion of phone phreaking the author states that the publication titled 2600 was named after the frequency that a quarter made when falling into a pay phone. 2600 Hertz is actually the frequency of a supervisory tone that was used to bypass toll equipment.
In an evaluation of the hacker Kevin Mitnick's his technical abilities were rated as #2 in the world. I am personally aquatinted with associates of Mitnick who state that he is a technical wannabe that excels only in dumpster diving and social engineering.
[exerpted from a review for Security Management -- all rights reserved by the author]
In the recent flood of cyberspace publications, this book at best adds a mere trickle to the literature. While the author presents some interesting perspectives on United StatesFrench competition in industrial espionage (in fact, the book is translated into English from French), the faulty technical details present throughout ultimately sink this effort.
The author's disconnect with technology stands out in his discussion of the Clipper chip, which is now installed in most standalone voice encryptors sold in the United States--but in few other applications. The author contends that the National Security Agency proposes to add the chip to every telephone manufactured in the United States. This statement is both illogical and wrong. Analog phones, which can't take chips, continue to be widely manufactured because they are far more affordable than digital phones. Moreover, digital phones are generally hooked to analog lines and don't use encryption. Thus, installing Clipper in all phones makes no sense.
The author even confuses commonly known security details. In a discussion of phone phreaking, for example, he claims that the publication titled 2600 was named after the frequency generated by a quarter as it plunks into the slot in a pay phone. In fact, the publication's title derives from the frequency in hertz of a supervisory tone used to bypass toll equipment.
And in places the book lapses from a balanced discussion into political commentary. For example, after criticizing filtering programs that block access to pornographic and other objectionable Web sites, the author states that "The fun for those who devote themselves to censorship is the daily discovery of new sites that they can condemn and prohibit."
Instead of providing new material, this book is essentially a collection of accounts of computer intrusions previously published in newspapers. Security managers seeking a digest of hacking articles might find some value in this book, but it is not recommended for serious practitioners.
Reviewer: Gordon Mitchell, Ph.D., manages Future Focus, a Seattle-area company that gathers clues from hard disks for commercial clients. He is a member of ASIS. D&M company for scientific research
Used price: $7.00
Collectible price: $10.59
Used price: $11.95
Collectible price: $15.88
Used price: $12.50
Buy one from zShops for: $10.00
The period of denouement was exciting and fun, but I found the ultimate resolution almost entirely unbelievable. The remedy just plain wouldn't work, and at some level that's the point of the book. I think he shied away from the apocalyptic ending he had planned, and the result -- at least for me -- meant that the plot ended with a wimper, and that was most of what this book had going for it.
The real protagonist of this story is the internet, and the author definitely knows his computer vulnerabilities. This could work as a teaching story; but that just isn't interesting enough for 500+ pages of fiction. I think this work would have benefited from some aggressive editing. If you are a layman technologist, want some lightweight introduction to computer security, you might enjoy this book. In particular, for anyone unaware of the risks that accompany the benefits of our online, interconnected civilization, this book could be a very interesting read.
As for me, I found it thin and overlong.