Skip to main content

Book Review: “Breakpoint (2007)” by Richard Clarke

Executive Summary: If you like Michael Crichton stories like “Jurassic Park” and “State of Fear,” you will like this book. It is not a must-read for cyber security professionals, but it is an entertaining story that you can hand to your family members, friends and bosses to illustrate what could be done in cyber space by a well-resourced adversary. Along the way, you will learn a little about the ethical issues, pro and con, surrounding the Transhumanist Movement – the advocation of using performance enhancement technology to influence human evolution – and you will enjoy a rollercoaster of a ride as the heroes attempt to determine who the bad guys are and how to stop them. 

There is a lot to love in this novel. Richard Clark jams a boat-load of cutting edge cyber security ideas into this little Crichton-esque [1][2] political thriller. He wrote it in 2007 but set it in the near future of 2012 and when I say there is a boat-load of information, I am talking about yacht-sized, not dingy-sized. The bad guys in this novel execute most of the cyber fantasy attacks against the United States that any group of cyber security geeks (including myself) could conger up after a few beers sitting around a bar at the annual Blackhat [3] / DEFCON [4] conventions in Vegas (one of the settings in the book). Clarke gives us bombings of US beach head routers on both coasts that reduce inbound and outbound internet traffic to just 10%, buffer overflow attacks against a communications satellite that sends it reeling out to space, SCADA attacks that blow up a research institution with a live nuclear reactor and a well-coordinated SCADA attack that takes out all power west of the Mississippi. Of course, in the novel, US government leadership, specifically the Intelligence Community (IC), thinks the Chinese are behind everything and they put all of their efforts into proving it.

All of these “fantasy” attacks are quite possible in the real world and the cyber security community has been talking about them for at least the last decade. Some experts believe that the Chinese government might execute something similar to these attacks in an effort to dissuade the US government from coming down on the wrong side of the “Taiwan” issue [5]. Clarke would know. Before he retired from government service, he served three different Presidents as the Special Assistant to the President for Global Affairs, the National Coordinator for Security and Counterterrorism and the Special Advisor to the President for Cyber Security [6]. The political theory behind these acts is something called Escalation Dominance [7]. It is the idea that China, or any government really, would launch some kind of attack against the US that would hurt the country in an effort to prove that they could launch a much larger attack that would really hurt if the US did something that China did not like. In the afterword to this novel, Clark said that it was easier to talk about these issues in a fictional form then it was to talk about them in dry, academic and political journals. I concur. They are much more exciting and frightening splashed across the fictional page.

The cyber ideas in this novel are not what the story is ultimately about however. They are just the means to an end. [SPOILER ALERT] It turns out that the bad guys are not the Chinese. The real bad guys are a group of people that are not too keen on something called the Transhumanist Movement: a philosophy that espouses using genomics, robotics, informatics, nanotech, and new-pharma to change humanity into a new species [8]. They are worried about the religious and moral implications of man being directly involved in deciding the next steps in human evolution and they have a billionaire benefactor who can fund their terrorist operations. His name is Will Gaudium. In the novel, Gaudium is one of the original Internet founding fathers and made his fortune with an internet startup. I believe though, that Clarke based Gaudium on a real world guy by the name of Bill Joy.

Bill Joy is really one of the Internet founding forefathers. He created vi, the original UNIX text editor [12]. He had a big hand in creating BSD UNIX [13], the precursor to LINUX and, for all intents and purposes, created the first working software implementing of the TCP-IP stack [13]. He went on to co-found Sun Microsystems; a company that built some of the most beautiful UNIX machines of the time [13]. And then, out of nowhere, he wrote an article for Wired Magazine decrying the Transhumanist Movement [9]. To have somebody of that stature, a legend really, come out against the advancements of science made the entire scientific community pause for a beat. Some were comparing his manifesto to Albert Einstein’s letter to President Eisenhower that argued against the use of nuclear weapons [13]. If somebody like Bill Joy says that we need to think a bit before we go forward with transhumanism, then maybe we better do it. I may be wrong, but the resemblance between the real-world Bill Joy and the fictional Will Gaudium is unmistakable.

Clarke’s story races across 10 days in March of 2012 as our heroes, Susan Connor – an agent for the Intelligence Analysis Center (IAC) – and Jim Foley – an ex-marine on loan to the IAC from the NYPD, try to out-think the US Intelligence Apparatus and Law Enforcement community and track down the real culprits behind the Internet attacks. Critics have taken Clarke to task for his wooden characters in the story, but I found that not to be true. I liked his portrayal of the misguided internet billionaire especially and I liked the way he portrays New York and Boston cops. And I really appreciated that he did not try to establish some sort of romantic relationship between Foley and Connor. Foley is a little flat as a character, but I am OK with that.

The bottom line here is that this is book is a fun political thriller that gets the cyber security stuff right. I recommend it.


Sources 

[1] Michael Crichton is probably best known for writing the novel, “Jurassic Park,” but during his lifetime, he wrote many near-future books that took a new technological idea into the near future to see what would happen. Books like “State of Fear,” “Prey,” “Timeline,” “Airframe,” and “Disclosure,” were some of my favorites. 


[2] “Michael Crichton: The Official Site,” Last Visited: 1 January 2013, 

[3] “blackhat USA 2103,” Last Visited: 1 January 2013,

[4] “DEFCON,” Last Visited: 1 January 2013, 
https://www.defcon.org/ 

[5] “China and Taiwan’s Running Dispute,” The Real Clear Politics Blog, 8 March 2007, Last Visited: 1 January 2013,

[6] “Bio: Richard A. Clarke,” Cyber War by Richard A. Clarke and Robert K. Knake, Last Visited: 1 January 2013,

[7] “Navigating the Taiwan Strait: Deterrence, Escalation Dominance, and US-China” by Robert Ross, Belfer Center for Science and International Affairs, John F. Kennedy School of Government, Harvard University, Fall of 2002, Last Visited: 1 January 2013, 
http://belfercenter.ksg.harvard.edu/publication/250/navigating_the_taiwan_strait.html 

[8] “United Nations Envisions Transhumanist Future where Man is Obsolete,” by Aaron Dykes, Infowars.com, 10 June 2012, Last Visited: 1 January 2013, 

[9] “Why the Future Doesn’t Need Us,” by Bill Joy, Wired Magazine, April 2000, Last Visited: 1 January 2013,
http://www.wired.com/wired/archive/8.04/joy.html 

[10] “The Joy of Programming,” by Andy Ross, AndyRoss.net, Last Visited: 1 January 2013,
http://www.andyross.net/bill_joy.htm 

[11] “Bill Joy, ‘Outliers-The Story of Success’, ‘The Dream of a Lifetime’, and No MTS Charges?” Michigan Terminal Archive System, Last Visited: 1 January 2013, 

[12] “Bill Joy’s Greatest Gift to Man – the vi Editor,” by Ashlee Vance, the Register, 11 September 2003, Last Visited: 1 January 2013,

[13] “BSD UNIX: Power to the People, from the Code,” by Andrew Leonard, Salon Magazine, 16 May 2000, Last Visited: 1 January 2013,

[14] “Hope is a Lousy Defense,” by Spencer Reiss, Wired Magazine, 11 December 2004, Last Visited: 1 January 2013,
http://www.wired.com/wired/archive/11.12/billjoy_pr.html

Popular posts from this blog

Book Review: Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen (2011)

Executive Summary
Kingpin tells the story of the rise and fall of a hacker legend: Max Butler. Butler is most famous for his epic, hostile hacking takeover in August 2006 of four of the criminal underground’s prominent credit card forums. He is also tangentially associated with the TJX data breach of 2007. His downfall resulted from the famous FBI sting called Operation Firewall where agent Keith Mularski was able to infiltrate one of the four forums Butler had hacked: DarkMarket. But Butler’s transition from pure white-hat hacker into something gray—sometimes a white hat, sometimes a black hat—is a treatise on the cyber criminal world. The author of Kingpin, Kevin Poulsen, imbues the story with lush descriptions of how Butler hacked his way around the Internet and pulls the curtain back on how the cyber criminal world functions. In much the same way that Cuckoo's Egg reads like a spy novel, Kingpin reads like a crime novel. Cyber security professionals might know the highlights of…

Books You Should Have Read By Now

When I started Terebrate back in January 2010, I always intended it to be a place to put my book reviews on whatever I was reading. Since then, a lot has happened in my professional life. I changed jobs, twice. I presented my collection of cybersecurity book reviews at the annual RSA Conference and suggested that the cybersecurity community ought to have a list of books that we all should have read by now. My current employer, Palo Alto Networks, liked the idea so much that they decided to sponsor it. We ended up creating the the Rock and Roll Hall of Fame for cybersecurity books. We formed a committee of cybersecurity experts from journalists, CISOs, researchers and marketing people who were all passionate about reading. My collection became the the candidate list and for the past two years, the committee, with the help of community voting, has selected books from the candidate list to be inducted into something we are calling the Cybersecurity Canon. It has been very exciting.

This i…

Cryptocurrency, Blockchain and Bitcoin: It All Seems So Mysterious

Executive Summary
When Satoshi Nakamoto published his seminal paper called Bitcoin: A Peer-to-Peer Electronic Cash System in October 2008, he started what is arguably the first viable cryptocurrency. Bitcoins have steadily increased in value from its inception to today where one bitcoin is worth some $6,500 and its success has encouraged the development of some thousand other cryptocurrencies. But it begs the question, how does an electronic string of digits contain any value at all and why do the 22 million Bitcoin practitioners in the world today think this is so special? To answer the value question, you have to remember why any currency system has value. The U.S. dollar has value because we all agree that it does. Bitcoins have value because 22 million Bitcoin practitioners have faith that it does too. Bitcoins are also scarce meaning that there is a finite number in the world. This has a contributing affect to why bitcoins have increased in value. To answer why Bitcoin is special…