Book review: The Florentine Deception, by Carey Nachenberg

Posted by   Virus Bulletin on   May 13, 2015

John Hawes reviews Carey Nachenberg's debut novel.

There's a rather serious problem with fiction involving computers, and computer security in particular. It seems like any time a computer appears in a work of fiction, especially in a Hollywood movie or a TV show, any attempt to adhere to reality goes out the window.

The ubiquitous super-hacker of fiction can break in anywhere he or she wants, within minutes, with no research or preparation, and quite often using only a phone or a wheezy Internet café PC. You can guess anyone's password in a few attempts, especially if you have their family photos handy, but you rarely need to as no one has a screenlock on their laptop, ever. In an emergency, it's perfectly possible to write code in the space of a few hours which will not only run on the systems of an alien race, but will actually self-propagate and disable their diabolical attack ships.

This playing fast and loose with how things really work is probably closely tied to a widespread lack of understanding about how computers function and what they are capable of. People in general neither know nor particularly care what goes on behind their browser or mail client, so writers and filmmakers — even those who at least make a token effort at research in most areas — don't have much understanding either, and base their technical details on stuff they've seen or read elsewhere.

This, of course, only spreads the standard misconceptions further, to the point where most readers will accept the most improbable or impossible of scenarios merely because it features computers and is therefore beyond the wit of man to really understand.

Countering this trend, we have seen a few attempts recently at cyber-themed fiction with some grounding in realism. The latest is from Symantec veteran Carey Nachenberg, whose debut, The Florentine Deception, promises to overturn the low expectations of those who know enough about computers and security to laugh hysterically at most stories which feature cyber peril.

The story starts with our hero, Alex, the founder of a successful security startup, resting on his laurels after selling his stake, digging around an old computer on its way to a charity. This gives us room for a good poke through some of the things someone with a little basic knowledge can find out about you if you don't clean up your computer before you throw it out, and opens up a nice little mystery to get the ball rolling on the story.

From this point we spiral into a well-paced romp featuring plenty of twists and turns, puzzles and surprises, and several good set-piece scenes, many of which generate some serious suspense. Alex is variously helped and hindered by a fairly large and diverse cast of characters who, while not always fully fleshed out, are generally given enough colour to keep them from overlapping, and occasionally get taken out of the action just as you're getting to like them, keeping the reader on their toes.

Following the classic prescription to 'write what you know', the book combines two of Nachenberg's passions: computer security and rock-climbing. Climbing features in several scenes including an extended caving sequence which gets distinctly claustrophobic. As a dedicated ground-dweller, I can't say much about the accuracy of these bits but they certainly have an air of authenticity about them, and of course the computer stuff is pretty plausible throughout. More importantly, and again this is hard to judge, the writing seems pitched at just about the right level, giving enough detail for most people to follow without dipping into jargon or skimming over important facts, but not making the exposition bits too dull for those who already get the picture.

The addition of the climbing angle also makes sure we get plenty of time away from the computer screen and fit in some fresh air and exercise, which helps keep the pace ticking over nicely. Indeed, the computer stuff is well balanced so as not to dominate things at all, running through the story as a motif rather than the main point of focus.

At several points during the book I found myself hurrying through other tasks, including meals, to get back to the action, and reached the end both thoroughly satisfied and wanting more, which is about as good a recommendation as you can get for a thriller. More than just an enjoyable page-turner with an educational spin, the book has some aims well beyond mere entertainment — proceeds from sales of the book will be donated to a selection of charities, mainly educational with a little climbing thrown in. So even if thrillers are not your thing, buy a copy anyway, and give it to someone who will benefit from a little enlightenment.



Posted on 13 May 2015 by John Hawes
twitter.png
fb.png
linkedin.png
googleplus.png
reddit.png

 

Latest posts:

VB2018 presentation: The wolf in sheep's clothing - undressed

Today, we publish the video of the VB2018 presentation by CSIS researchers Benoît Ancel and Aleksejs Kuprins, who looked at a rather dubious seller of government spyware, described by someone else operating in the same space as a "criminal of the…

VB2018 paper: The dark side of WebAssembly

Today, we publish the VB2018 paper by Symantec researchers Aishwarya Lonkar and Siddhesh Chandrayan on the security risks that come with WebAssembly.

The Virus Bulletin conference returns home: VB2019 to take place in London

In 2019, the Virus Bulletin conference is set to return home, with VB2019 taking place in London, UK.

Guest blog: The case for increasing transparency in cybersecurity

In a guest blog post, Kaspersky Lab's Anton Shingarev considers the case for increasing transparency in cybersecurity.

VB2018 preview: Workshops

Workshops make their VB Conference debut during VB2018, giving delegates the opportunity to learn the basics of kernel-level malware analysis, Android reverse-engineering and artificial intelligence.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.