Bill Clinton's cyber-attack novel: The airport haxploit-blockbuster you knew it would be

Wannabe Die Hard with the literary genius of The Da Vinci Code


Book review The Register has read the The President Is Missing by Bill Clinton and James Patterson so you don't have to. Don't say we never do anything for you...

Bill Clinton’s foray into co-authoring a novel is an awkward hybrid of cyber thriller and reflections on the loneliness and responsibility of high political office.

The President Is Missing, co-written with prolific potboiler author and Stephen King botherer James Patterson, plays with a familiar trope: the leader of the free world as an action hero.

In the book, the fictional President Jon Duncan is given five days to prevent a cataclysmic cyber attack that would erase financial records, disable the power grid, break water purification systems and disable mobile phone networks.

Clinton vs Trump

It's Russian hackers, FBI and Wikileaks wot won it – Hillary Clinton on her devastating election loss

READ MORE

Yes that’s right: it’s a cyber Pearl Harbour.

As if that’s not enough, President Duncan is also facing impeachment proceedings while coping with a long term health condition and fending off a pregnant would-be assassin and her cohorts.

Phew.

The fictional president, a former governor of a southern US state (remind you of anyone?) and widower, responds to all this stress by going off-grid to sort things out.

According to former Clinton Secret Service man Gary Byrne, the former president was allegedly able to give his Secret Service protectors the slip several times. This possibility of ditching the detail gives The President Is Missing one of its central plot elements.

The fictional prez, a former Army Ranger and Gulf War veteran, adopts his disguise before making his way out of the White House through a secret tunnel and meeting a hacker who, having helped to make and plant a devastating wiper strain of malware, has second thoughts about bringing down western civilisation.

The book meshes elements of the Kiefer Sutherland-starring jeopardy series 24 plot with elements of Die Hard 4 and themes of betrayal from House of Cards. The prose is as pedestrian as Stephen King might expect, and best compared to the Da Vinci Code.

The plot is functional enough but the characters, including female Bosnian assassin Bach, are mere ciphers that don’t linger in the imagination after reading the book. There is quite a lot of reflection on the people who enter politics and Democratic talking points that would sit more naturally in a memoir or political diary.

Those reading the novel for insights into the US political process or what it’s like to be president will find points of interest. Parts of the book, such as a passage relating the telephoning the mother of a dead soldier, have the mark of authenticity.

The literary running mates – Clinton and Patterson – have read the Cliff Notes but they don’t really know a great deal about cyber, elements of which are used to season the pot of what in essence remains a would-be airport blockbuster. The book is 513 pages in hardcover but split into 10 page chapters for easy digestion.

 Manchester airport billboard [pic: John Leyden]

Manchester airport billboard for Clinton cyberthriller

To Russia, with love...

Unsurprisingly, the Russians are the cyber antagonists in the book. The real-life Russian government hacking crew, Fancy Bear (APT28, a unit of Russian military intelligence or GRU), even gets a name-check. The Russians act through a proxy group called the Sons of Jihad, who (despite their name) are nationalists rather than jihadists.

Duncan’s impeachment proceedings stem from a phone call to the leader of the group, during which he uncovers a plot to unleash a virus so horrible it is called the Dark Ages.

The cyber attack itself is rather pedestrian – a wiper. Even university security operation centre staff these days train on simulations with multiple attack vectors (hacking, malware, DDoS etc). The malware-based "McGuffin" at the centre of the action does have advanced (not to say almost magical cloaking) abilities that make it hard to defuse.

It’s a bit better than CSI: Cyber, but then what isn’t? There are already plans from Showtime to turn the book into a 16 part series.

For those that can’t wait, The President is Missing is already half-price on Amazon for £10 or $15. The official website is here. ®


Other stories you might like

  • To Washington's relief, GlobalWafers to spend $5 billion on Texas plant
    Cash had been burning a hole in company's pocket after deal to buy Siltronic fell through

    Taiwan's GlobalWafers announced on Monday a new use for the $5 billion it first earmarked for a purchase of Germany's Siltronics: building a 300-millimeter semiconductor wafer plant in the US state of Texas.

    Construction on the facility – which will eventually span 3.2 million square feet – is expected to commence later this year, with chip production commencing by 2025. The plant will sit in the city of Sherman, near the Texas-Oklahoma border, where it is slated to bring in 1,500 jobs as production climbs towards 1.2 million wafers per month.

    GlobalWafers is the world's third largest producer of silicon wafers and Sherman is already home to its subsidiary, GlobiTech.

    Continue reading
  • Tencent admits to poisoned QR code attack on QQ chat platform
    Could it be Beijing was right about games being bad for China?

    Chinese web giant Tencent has admitted to a significant account hijack attack on its QQ.com messaging and social media platform.

    In a post to rival social media platform Sina Weibo – a rough analog of Twitter – Tencent apologized for the incident.

    The problem manifested on Sunday night and saw an unnamed number of QQ users complain their credentials no longer allowed them access to their accounts. Tencent has characterized that issue as representing "stolen" accounts.

    Continue reading
  • Carnival Cruises torpedoed by US states, agrees to pay $6m after waves of cyberattacks
    Now those are some phishing boats

    Carnival Cruise Lines will cough up more than $6 million to end two separate lawsuits filed by 46 states in the US after sensitive, personal information on customers and employees was accessed in a string of cyberattacks.

    A couple of years ago, as the coronavirus pandemic was taking hold, the Miami-based biz revealed intruders had not only encrypted some of its data but also downloaded a collection of names and addresses; Social Security info, driver's license, and passport numbers; and health and payment information of thousands of people in almost every American state.

    It all started to go wrong more than a year prior, as the cruise line became aware of suspicious activity in May 2019. This apparently wasn't disclosed until 10 months later, in March 2020.

    Continue reading
  • India extends deadline for compliance with infosec logging rules by 90 days
    Helpfully announced extension on deadline day

    India's Ministry of Electronics and Information Technology (MeitY) and the local Computer Emergency Response Team (CERT-In) have extended the deadline for compliance with the Cyber Security Directions introduced on April 28, which were due to take effect yesterday.

    The Directions require verbose logging of users' activities on VPNs and clouds, reporting of infosec incidents within six hours of detection - even for trivial things like unusual port scanning - exclusive use of Indian network time protocol servers, and many other burdensome requirements. The Directions were purported to improve the security of local organisations, and to give CERT-In information it could use to assess threats to India. Yet the Directions allowed incident reports to be sent by fax – good ol' fax – to CERT-In, which offered no evidence it operates or would build infrastructure capable of ingesting or analyzing the millions of incident reports it would be sent by compliant organizations.

    The Directions were roundly criticized by tech lobby groups that pointed out requirements such as compelling clouds to store logs of customers' activities was futile, since clouds don't log what goes on inside resources rented by their customers. VPN providers quit India and moved their servers offshore, citing the impossibility of storing user logs when their entire business model rests on not logging user activities. VPN operators going offshore means India's government is therefore less able to influence such outfits.

    Continue reading

Biting the hand that feeds IT © 1998–2022