Home :: Books :: Computers & Internet  

Arts & Photography
Audio CDs
Audiocassettes
Biographies & Memoirs
Business & Investing
Children's Books
Christianity
Comics & Graphic Novels
Computers & Internet

Cooking, Food & Wine
Entertainment
Gay & Lesbian
Health, Mind & Body
History
Home & Garden
Horror
Literature & Fiction
Mystery & Thrillers
Nonfiction
Outdoors & Nature
Parenting & Families
Professional & Technical
Reference
Religion & Spirituality
Romance
Science
Science Fiction & Fantasy
Sports
Teens
Travel
Women's Fiction
The Mezonic Agenda: Hacking the Presidency

The Mezonic Agenda: Hacking the Presidency

List Price: $34.95
Your Price: $22.02
Product Info Reviews

<< 1 >>

Rating: 1 stars
Summary: Terrible writing about stupid "security experts"
Review: I read some good reviews of this book and decided to buy it. I'm about 130 pages in and its agonizing. The writing is terrible - most pulp fiction is of a better quality. So if not the writing, what about the tech? Well, you have to suspend your disbelief, go along with the vanity of the main character who thinks he is God's own security expert (testifying to congress, no less), but doesn't have the brains to look up an obscure quote (which is biblical) on Google. Or one of the world's top undergound hackers, who "encrypts" highly sensitive data using repeated XOR with the chapter and verse corresponding to said biblical quote.

If you know nothing about security, you may find this book mildly educational (but you could do so much better - go read "Security Warrior" instead, for example). If you do know about security, you will find yourself groaning at the stupidity of it all.


Rating: 5 stars
Summary: From the co-author
Review: In writing this book we felt the best way to raise awareness to the issues surrounding electronic voting was through an entertaining story that includes real technology in use today. Additionally the non-fiction sections in the back of the book discuss voting history and software security exploits and vulnerabilities.

It has been a pleasure working on this novel with my good friend, Dr. Herbert Thompson, and we hope you all enjoy it as much we did writing it!

Spyros Nomikos
Co-Author, "The Mezonic Agenda: Hacking the Presidency"

Rating: 3 stars
Summary: Mildly entertaining
Review: Part I of the book is a fictional novel (the first 240 pages) and was a very easy read and mildly entertaining. The premise - manipulating an election - takes current events and blurs the line between fiction and non-fiction. In my opinion, if this were a movie, it would go straight to video.

That said, depending on your interest in computers, the novel portion and the included CD to "hack along" with the story might be quite a bit of fun. The web site for the book (as of 10/15) has an encrypted message which you can decipher using some of the techniques in the book - and will add more things to do as time goes on. It's an interesting way to make a "print" book interactive.

I liked the information found in Part II of the book, which goes into a brief history of voting, reverse engineering, cryptography, buffer overflows and steganography. I think it does a pretty good job at pointing out how easy, as least conceptually, manipulating digital information really is.

Rating: 3 stars
Summary: Overpriced
Review: The authors elicit my grudging admiration for their skill in explaining fundamental cryptographic ideas. Like a Caesar cipher, frequency analysis and steganography. For the latter, there is a neat usage which does not involve the obvious canonical textbook example of low order bits in an image. Very clever, for those of you who appreciate such things.

Sadly, though, if you regard this book primarily as a novel, then it is lacking. There is a good reason why a techno-thriller writer like Tom Clancy can sell his novels in the millions, whereas this book is unlikely to. No amount of technical jargon should be allowed to outweigh the importance of the plot and the originality of the characters, and the writing quality with which these are expressed. Here, the plot is a thin veneer on the technology and the polemic that the authors are pushing. Most of the characters (especially the villains) are one dimensional cardboard.

Adding insult to injury, the book is substantially overpriced at $35. If this was priced as a standard paperback novel, it might be tolerable.

Rating: 4 stars
Summary: Good book about an important subject
Review: The book chronicles the final week before security expert Professor Chad Davis is to testify before Congress on the security of a commercial e-voting software product made by a fictitious company, Advice Software, Inc.

Davis' testimony will ultimately determine if the software will be implemented for use during the United States' 2004 presidential election, and therefore create a huge windfall for the company. The company will do anything and everything it can to ensure that Davis provides positive testimony. Advice will stop at nothing to complete their mission; that means they'll engage in multiple murders, kidnapping and a slew of other nefarious activities. All of this is addition to simultaneously attempting to corner the video chip market, and create video drivers that send subliminal messages about which candidate to vote for.

As Albert Einstein said, "Make everything as simple as possible, but not simpler." The plot could have been made much simpler to mimic reality and the current state of insecure e-voting systems. As in real life, the e-voting companies are getting away with providing insecure e-voting systems; under the nose of the Federal Election Commission (FEC) and an unsuspecting and apathetic voting public. The idea that an e-voting software company would resort to murder is where the book demonstrates it is a novel.

The reason e-voting companies and their insecure software can run roughshod through the FEC is that voting-system flaws do not have the same immediate tragic consequences that other product failures can. Plane crashes and adverse drug effects spur the FAA and FDA to take drastic actions and often overreact to an event; poorly written and insecure voting software is clearly not as newsworthy as a burning jet.

Combine this with a public that is utterly apathetic to voting in general and the situation is ripe for the situation where e-voting can have a near hypnotic effect on most people involved. Because voter turnout for U.S. presidential elections is quite low (60% of eligible voters cast their ballots in the November 2000 presidential election), and most people are completely unaware of the dangers of insecure voting applications, an under-funded federal agency can be manipulated by the e-voting vendors to roll out insecure voting software.

The international intrigue of the novel takes the reader to the RSA security conference in Amsterdam, where Davis is given a cryptic CD-ROM by Baff Lexicon, a notorious international hacker. Lexicon suggests there is serious problems with the software and will brief Davis at midnight that night at the Amsterdam Hard Rock Cafe on the details. Unfortunately, Lexicon is being trailed by undercover agents from Advice, and is murdered a few hours later by a Yugoslavian hit man that the company seems to have on retainer.

Davis now has the difficult job of unlocking the cryptic information on the CD-ROM on his own. That same CD-ROM is included with the book, and the reader is invited to join Davis in attempting to decrypt the contents of the CD and the conspiracy that Advice Software is attempting to perpetrate; namely the outcome of the 2004 election.

(If you are not interested in buying the book, anyone can download the software without having to buy the book. The software is actually part of a contest and the winner will receive a free pass to the BlackHat 2005 conference.)

A good section of the novel then details how Davis attempts to decipher the secrets that Baff Lexicon was attempting to convey to him. The two authors of The Mezonic Agenda have, respectively, a PhD in applied mathematics and a Master's in chemical engineering, and write in a someone choppy style representative of their technical backgrounds. Occasional errors in grammar and spelling are excused, save for the egregious misspelling of Learjet on page 154.

The story concludes with a moral dilemma that Davis faces: with his wife and daughter kidnapped by the Advice Software hit man, does he provide favorable, yet dishonest testimony about the software and watch his family set free; or tell the truth and watch them die?

The novel itself takes up 240 of the books 370 pages, with the last five parts dedicated to a history of voting, reverse engineering, cryptography, buffer overflows and steganography.

As a standalone novel, the book (while entertaining and enjoyably readable) is somewhat overpriced at $34.95, especially since the enclosed CD-ROM is freely downloadable and the plot is somewhat thin. The non-fiction final section, though, is quite informative and effectively complements the novel.

This novel does a good job of explaining how software can be cracked, and provides the reader with a good overview of security concepts such as buffer overflows, reverse engineering, cryptography, and more. It is hoped that the book will find itself in the hands of members of Congress and the FEC, who truly need to be educated in such fundamental security topics.

As a novel, The Mezonic Agenda will not compete with books from Tom Clancy or Robert Ludlum. But because insecure e-voting is one of the greatest threats to democracy today, it is a much needed title.


Rating: 4 stars
Summary: "Mezonic Agenda": A good read
Review: The book, "The Mezonic Agenda: Hacking the Presidency," is not your ordinary read. It is a mystery, hidden in a puzzle, wrapped around a riddle--no joking.

It is important to mention that the lessons taught by the authors via their novel are meant to "...educate, and empower the reader with information about software security and the challenges of implementing modern voting systems...." as quoted from the novel's Preface (page xvii), not to provide a "how to" seminar on hacking.

The book contains 368 pages; however, the novel only takes up 241 of those pages. The book is divided into two parts: Part I is the story itself; Part II is entitled "The Technology behind The Mezonic Agenda," followed by five appendices, each covering their own subject. And, all quite interesting themselves.

The novel's main character, Chad Davis, is a world famous computer security expert, often called upon to beta test the newest and greatest security software by developers. This time, though, Chad is invited to Washington to provide critical, expert testimony on the security and validity of software company Advice Software, Inc., e-vote software. This software is projected to be utilized during the 2004 Presidential Election--high stakes, indeed!

But, that is not all. You are involved, too. Yep, you are right in the middle of it. The novel comes with a CDROM chockfull of files--revealed only when you solve the riddles of the three files provided. In fact, there is a contest which challenges you to decipher all the clues within the story and then use what you have learned to have yourself elected President of the United States. The winners receive a free pass to Black Hat USA 2005. The files require a PC, by the way, but the methods discussed are applicable to all computing environments.

The novel was a good read and held my interest, not really what I expected from a mathematician and a chemical engineer. Of course, the technical parts of the story are quite fascinating and very intriguing...and the interactive piece of the story furnishes some good fun!

Bottom line: Worth the read? Yes. Do I recommend it? Yes.


Rating: 4 stars
Summary: Relevant information based on current events...
Review: The latest in the Syngress line of techno/hacking novels is The Mezonic Agenda - Hacking The Presidency by Dr. Herbert H. Thompson and Spyros Nomikos. While not on par with the writings of a Tom Clancy, it's worth reading for its relevancy to current events...

Chad Davis is a computer researcher who is due to testify before Congress on an electronic voting system that he has been studying for security issues. He can't seem to find any issues until a cracker gives him an encrypted diskette of information damaging to the new system. But before Davis can get the story from the guy, he's murdered. Davis has to figure out how to crack the CD in order to learn what the hacker had discovered. Meanwhile, a powerful group of people are pushing for the usage of this system so that they can control the outcome of the election and dish out their own form of retribution for September 11th. This group will stop at nothing to accomplish their goals, and Davis' life is worth nothing if he doesn't play along.

This novel actually explains how software can be cracked, with decent explanations on buffer overflows and encryption. In fact, the book comes with a CD that you can use to practice your skills after reading the book. The person who can crack the CD can win a trip to a security conference in 2005. Pretty good practical application there! After the core story, there are appendices that explain the history of voting, encryption, buffer overflows, and stenography. I actually learned quite a bit about the history of voting from this information. And given the Florida fiasco of the 2000 election and the controversy over the use of Diebold voting machines with no audit trail, the general concepts in this book are extremely relevant to current events.

Is it an excellent novel? It's so-so... And the ending is rather abrupt for my liking. But if you haven't given much thought to the whole e-voting controversy, this book will give you a good foundation to be concerned.

Rating: 4 stars
Summary: Good fiction with additional educational value
Review: The U.S. moved to electronic voting for the presidential election in 2004. At the same time hackers continue to prove again and again that there are always ways to get into a system and change data. The question now becomes one of whether a really determined hacker can alter the results of such a presidential election. This is the premise of The Mezonic Agenda. It is a fictional story of Chad Davis who spearheads an effort to penetrate the defenses of e-vote hardware from Advice Software, Inc. It is a good read but is also an educational story that allows you to learn many of the fundamentals of software deconstruction, how it is used to hide information, and other ways a hacker might penetrate a system.

In addition to the book there is a CD that includes a game competition to begin in 2005. Hidden within the book and the files on the CD is information that if correctly decrypted allows you to elect yourself president! This is a unique twist that has you directly applying the methods you learn in the book.

The Mezonic Agenda is a recommended read as good fiction, an educational book, and just plain fun. Pick up a copy and enjoy.

Rating: 5 stars
Summary: An Educational Novel
Review: We just got in the new electronic voting machines. During the first public demo, the system crashed and the machines just sat there.

The poll workers, in their training on the machines had been shown a yellow button on the back of the machine (Reset). They were told repeatedly -- this button is your friend. The yellow button got pushed, it didn't do anything. A bunch of us computer types started to chuckle. The people from the voting machine company didn't think it was very funny.

While the voting machine people were powering down and restarting the machine, a county official got up to talk about bi-lingual voting. You have to have bi-lingual voting. And somewhere up the chain of command a decision was handed down that we had to make our machine bi-lingual. So far so good.

By census records, I guess, some power that existed somewhere their made the decision that the second language on our machines had to be Piute indian. Well OK. Then they went to get the ballots translated. The Piute indians don't have a written language, and is only spoken by a few elderly people. What do we do now? No bi-lingual and we violate the federal election rules. Will all the ballots here be thrown out because of this technicality? Can we do the bi-lingual in Spanish which would really help the Hispanic people or does Piute have to be it?

This book is a about the upcoming election. It's about 2/3 fiction. The story is about 250 pages long. The next third of the book is non-fiction, and is about the technology behind the novel. It has chapters on the history of voting, voting machines, cryptography, buffer overflows, and steganography. These aren't as bad as they sound as they are closely tied to the novel. The explanations are quite simple and clear.

Finally there is a CD-ROM in the book. The CD contains just three files. When successfully decrypted more files are revealed. Finally if you can hack the CD, you become elgible for a prize being offered by the publisher.

Oh yes, the novel. It's a mystery with a current theme. If all the voting is being done electronically, it might be possible the hack into the voting systems and hack the Presidency. The hero is speaking at a security conference and just after his speech he is handed a CD that ... well, I'll leave you to guess the rest.

Rating: 4 stars
Summary: A good 'edu-tainment' book...
Review: When I first saw this book I was skeptical of the writing. How could a book about computers and the Presidency be even remotely entertaining? When I looked at it closer and discovered the educational prospects of the book, I got a lot more excited. The story is a bit minimalist, although well-written and enjoyable. I found the story more suspenseful because something like this could actually be possible, given the insecurity and non-accountability of existing e-Voting systems. Security professionals may not learn anything from the book or the accompanying material, but for the general populace with some computer knowledge, there is some 'edu-tainment' value here.

Well written and recommended reading.


<< 1 >>

© 2004, ReviewFocus or its affiliates