91 Cyber Security Terms You Need To Master

91 Cyber Security Terms You Need To Master

Cyber Security Terms are evolving every day. But to get a handle on them here are 91 of the most commonly used terms by hackers, writers and security officers. See how many you can find in popular spy and cybercrime fiction. 

One of the most banded about words today in UK cyber security terms, a “bot” refers to an automated software application that performs tasks over the internet. But not always does it refer to bad agents. Bots can be used for legitimate purposes, such as web indexing by search engines, but they often play a more sinister role. 

When used maliciously, a bot is typically part of a botnet, which is a network of compromised computers or devices that are remotely controlled by a cybercriminal. These bots can be used to carry out activities such as distributed denial-of-service (DDoS) attacks, where multiple bots flood a target website with traffic to make it unavailable. To crash the site intentionally.  They can  also be used to send out spam, distribute malware, or steal data.

Botnets are particularly dangerous because they can operate on a large scale, often involving thousands or even millions of compromised devices, and their activities can be difficult to detect because they mimic normal internet traffic. Therefore you can expect to see this as one of the many cyber security terms in daily life and also in contemporary political thrillers and fiction and non fiction on cybercrime

.

CYBER SECURITY TERMS FOR AUTHORS

Understanding cyber security terms is essential for authors writing in today’s digital age. Familiarity with key concepts like phishing, encryption, and firewalls enhances the authenticity of your work. These terms add depth to tech-driven plots, ensuring your narrative stays relevant and credible while engaging readers in a world where cyber threats are ever-present.

Alias

A false identity – to conceal who you are in the physical or digital worlds. Used all the time in the cyber world.

Backdoor

Secret entry points built into code to access a system. Used by governments and companies to access their networks. Software planted maliciously by hackers. A big risk to cyber security. 

Black Propaganda

Disinformation that is deniable by (and not traceable to) its source. Used by Government agencies, spies and malicious hackers.

Blackhat

Malicious hackers. Their goal is to infiltrate computer systems. Used by intelligence services looking for compromising information, or individuals either with criminal intentions or just out for kicks.

Bitcoin

A digital currency used to make anonymous purchases online and also in the physical world. Perfect for money launderers and tax dodgers.

Botnet

An extensive collection of hacked and compromised computers which are used to target and overload a website until it crashes. Also useful for decrypting files others don’t want you to. The use of the word “bot” is a common cyber security term

Breach

The term used for the moment a hacker successfully exploits a vulnerability in a computer or device, and gains access to its files and network.

BYOD (Bring Your Own Device)

Refers to a company security policy that allows for employees’ personal devices to be used in business. A BYOD policy sets out regulations, such as whether a personal phone or laptop can connect to the corporate network.

Buffer Overflow

Occurs when more data is written to a block of memory than the buffer is configured to hold. A hacker can exploit buffer overflow deliberately by trying to upload a super-large file to the server to write malicious scripts executable to permanent memory areas of the system.

Burner Phone

A burner phone is a cheap, prepaid mobile phone purchased with cash to avoid any kind of paper trail. So called, if authorities trace the number you can “trash and burn” and replace it with another.

CIA

U.S.’s foreign intelligence gathering service. Formally created in 1947, the Central Intelligence Agency (CIA) grew out of the World War II Office of Strategic Services (OSS).

Cipher

A message scrambled into nonsense by substituting and adding random letters. For someone to read it, they need a key or have a programme of cryptanalysis (see below). They now deal a lot with cyber security and cyber espionage.

Clickjacking

A hacking attack that tricks victims into clicking on an unintended link or button, usually disguised as a harmless element.

Cloaking

Cloaking is where a hacker presents you with content or a hyperlink that differs from what you actually see as in The Secret War when Karen identifies fake news. It is also a common link jacking practice among video streaming sites who trick you to click a video play button, but load an ad.

Cloud

Technology that allows access to our files and/or services through the internet from anywhere in the world. In fact, it’s just a collection of computers with huge storage capabilities that remotely serve requests. Now used more by people online than poets. 

Counterintelligence

The business of thwarting the efforts of foreign intelligence agencies, including gathering information on spies and conducting activities to prevent espionage, sabotage, assassinations on behalf of foreign powers and terrorist organisations.

Cracker

Also known as a black hat hacker, is someone who performs actions aimed at obtaining unauthorised access to software or a network.

Cryptanalysis

The art of deciphering coded messages.

‍CRYPTOLOGIST

An expert in cryptanalysis (see above).

Dangle

Someone sent by their country’s intelligence agency to a foreign intelligence agency in the hope of recruitment as a spy. They then become a double agent like Professor Wang in The Secret War

Dark web

The dark web is the hidden collective of internet sites only accessible by a special web browser. Used for keeping internet activity anonymous and private, it’s where cybercriminals certainly hang out. To access it, you need a special browser called Tor. Cyber security experts monitor the dark web.

Decryption

Break a code, with or without a key. Or a process that transforms encrypted information back to into its original format.

Deepfake

An audio or video clip edited and manipulated to seem real, such as the video of Robin Miller in The Missing Activist. Deepfakes can easily convince people to believe a certain theory. Used by conspiracy theorists and creators of political and financial propaganda.

Deep Web

This refers to the part of the internet not indexed by Google. This can be useful to legal groups such as clubs that simply do not want to appear on Google.

Distributed Denial of Service (DDoS)

DDOS is when hackers cram a target with so much traffic that the server gives in and the computer or website crashes.

Domain

A group of computers, printers and devices that are interconnected and governed as a whole. For example, your computer is usually part of a domain at your workplace.

Double Agent

A spy who pretends to be working against one country but who is, in fact, working for that country’s or organisation’s opponent. Used to spread disinformation. Today many double agents are experts in cyber security. 

Doxing

A term used for collecting information online about a target so you can cross-reference information to discover the real identity behind an alias.  For example, Karen Andersen needed to trace the real person behind “China Girl” in The Secret War to uncover the mystery behind the lethal agent DX21.

ELINT

Electronic intelligence, derived from the interception of radiation sources such as radars.

Encryption

A method of protecting data by applying a cipher so it can only be read by using a key.

Exploit

An exploit is a piece of software or series of commands executed to take advantage of a security vulnerability on a network or software. “Exploiting a network” means trying to compromise the security of a system by taking advantage of its vulnerabilities.

Exploit kit

An exploit kit is a collection of tools or software that run on web servers, scouting for vulnerabilities on the target machines and exploiting these vulnerabilities by executing malicious commands.

Firewall

A firewall is a filter that enables safe communication between users and systems within a network by keeping away any outside unwanted intrusion. It works as a shield to protect a web server from a DoS attack by filtering and discarding the malformed requests before they actually reach it. One of the most common of the cyber security terms. 

Friends

British slang for members of the Secret Intelligence Service.

Grayhat

These hackers break into systems without permission, motivated by a political goal or to trace someone. In The Missing Activist, Karen Andersen acts this way to log into the social media account of missing person Robin Miller, concerned about his mental status.

Hacktivist

A hacktivist is an activist who hacks a corporate website to draw attention to their political statement. It’s the equivalent of painting slogans on the side of an oil platform, and probably far effective in today’s age.

Honey Trap

Slang for use of men or women in sexual situations to intimidate or snare others, like Yoyo Chen in The Secret War

HUMINT

Intelligence collected from human sources. This may openly, as when police interview witnesses or suspects. With espionage, it’s done through covert means, i.e. tricking someone into giving out information.

Junk packets

These are simple internet connection requests sent rapidly involving great numbers designed to make a website crash.

Key

A string of letters and numbers which unlock an encrypted system. Similar to activating a piece of software. These are used to send important and secret data over the internet. Today, for greater security to lock data, both sender and recipient have different keys. A bit like a double lock, plus a bolt in cyber security terms..

HTTPS/SSL/TLS

HTTPS, which stands for HyperText Transfer Protocol, is a basic framework that controls how data transmits across the web. The extra S means that all data is first encrypted to add a further layer of security. SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are protocols used by HTTPS to provide identity proof. As a hacker can see data transmitted through plain HTTP, its recommended for sites which collect credit card information.

IP Address

An internet version of a home address for your computer, which is identified when it communicates over a network. Traceable.

Keystroke logging

Keystroke logging is the cyber security term which refers to using malware to record all keyboard strokes that a user presses on a computer. It is one of the most common password hacking techniques used by hackers to get passwords. Some free software you download online might come with a keystroke logger. Be wary.

Local

A local attack is where someone delivers malware directly to the vulnerable target computer or network by having previous access to it and escalating certain privileges. It is common for such kinds of attacks to be launched by a disgruntled employee who wants to take revenge on the company and inserts code that causes computers to fail. Often, the problems do not manifest all at once, but in a way that leaves the cause of the malfunction difficult to determine. For example, this happened at Siemans from 2014 through 2016.

Logic Bomb

An attack that is triggered by a specific event. The infected computer or hacked code is waiting for a single event or combination of events to launch its attack. The best known of these attacks might have been the Michelangelo virus, which was supposed to attack millions of computers on March 6, 1992. In 2013 The South Korean logic bomb cyber attack wiped data from computers in the country’s banking and broadcasting industries. For most companies, the threat comes from the inside (see above).

Malware

Any software or programme designed to hack or damage targets. Short for ‘malicious software’, Malware includes ransomware, RATs, and spyware.

Man in the middle

Someone who secretly hacks their way into communications between people or computers. They can then extract data or even add false information. Used a lot by spies on social media groups such as Facebook and LinkedIn, as well as WhatsApp. An example of this was when Karen joined a group of Jihadi brides in The Missing Activist as Basilah. There was another incident of a “Man in the Middle” in The Killing of the Cherrywood MP.

MI5

The British domestic counterintelligence service, officially known as the Security Service. Coming under the authority of the Home Secretary, it’s headed by a Director General (DG)  who presides over an internal security organisation, secretariat, legal advisory branch, and information services branch.

‍ MI6

The British foreign intelligence service, officially known as the Secret Intelligence Service. Formed in 1909, the “MI6” label originated when the agency was “section six” of military intelligence. The Chief of MI6 is directly accountable to the Foreign Secretary.

Nugget

British term for the bait (money, political asylum, sex, or career opportunity) offered to a potential defector.

NSO Group

Named after founders Niv, Shalev and Omri, an Israeli technology firm primarily known for its proprietary spyware Pegasus, which is capable of remote zero-click surveillance of smartphones. See below. S

One-time Pad

Strings of random numbers for singular use as a key in enciphering messages; the proper use of a one-time pad renders a message mathematically unbreakable.

Operational Security (OpSec)

On the internet, your IP address is a big giveaway to your identity.  Easily tracked, to hide it you need good OpSec. Also refers to not leaking personal information or writing anything which can blow your cover if you are a cyber criminal without much nouse. 

OSINT

Open source intelligence is information derived from publicly available sources.

Partridge Securities

Run by Donald Partridge, Partridge Securities is the fictional securities firm carrying out private investigations. Karen Andersen’s sometimes boss.

Payload

Payload is an ethical hacking terminology used to refer to the part of the virus or malware that performs the malicious actions like destroying system data or hijacking the computer system.

Pegasus

Trojan horse computer virus capable of reading text messages, tracking calls, collecting passwords, location tracking, accessing the target device’s microphone and camera from mobile phones. Used a lot in books and films. 

 

Penetration testing (Pentest)

The name given to the process of deliberately attacking a computer network to learn the weak points in the system. If you’re a major organisation, you will frequently run a pentest so you can fix these vulnerabilities before a hacker gains entry and runs havoc with your business.

Phishing

A harmless-looking email which could be dodgy. Often these communications contain within them an irresistible hook enticing you to open it such as, “We couldn’t deliver your parcel. Click here for …” Open it and your hacker gains access to private data you don’t want them to have. Most phishing emails have misspellings. Perhaps you don’t recognise the sender. Leave it alone and it can’t hurt you. But beware of spear-phishing. A more targeted and malicious approach, designed to look like it’s come from a friend or someone you trust. Time to up your OpSec.

Phreaker

A phreaker is a hacker who illegally breaks into a telephone network in order to wiretap voice calls or phone lines or make long-distance calls for free.

Plaintext

The original message before encryption.

Playback

To provide false information to the enemy while gaining accurate information from him or her.

Pocket Litter

Items in a spy’s pocket (receipts, coins, opera tickets, etc.) that add authenticity to his or her identity.

Provocateur

An operative sent to incite a target group to action for purposes of entrapping or embarrassing them.

Ransomware

Derived from “ransome” plus “malware”. This is when someone steals your data and holds it hostage. They’ll demand payment for its return, often bitcoins which can’t be traced. Sometimes they delete files for every minute you withhold payment. There’s nothing good about ransomware. It’s a bit like kidnapping on the net and really nasty.

Remote

A remote attack is where an attack is carried out by sending an exploit over a network to exploit security vulnerabilities in another machine without obtaining previous access to the vulnerable machine.

Remote administration tools (RATs)

Pieces of software that hide in the dark corners of your computer to give a hacker access and sometimes full administrator control. Not dissimilar to allowing a technician to enter your system to perform a remote fix. Therefore, some RATS are welcome, but be aware of those who are after your private data.

Rootkit

Rootkit is a type of malware that stealthily runs on a system, hiding certain programs or processes existing in a computer from being uncovered by normal detection methods, while giving continuous privileged access to the computer

Script kiddy

Name given to a starter in hacking who needs to use seasoned hackers’ scripts and codes to get going. Everyone was there once.

Shell

A piece of code planted on a website so that a hacker can gain access and do lots of damage if they want. Once they’re in, they can change things in your network and even take over control.

Shrink wrap code

Shrink wrap code is where an off-the-shelf software comes with certain features that the user is not aware of, or that can be used by an attacker to exploit the system. Gone are the days when you could pick up some good secondhand or cheap software on some dodgy market stall.

SIS

Secret Intelligence Service is the official name of Britain’s MI6. (See above)

Sleeper

Agent living as an ordinary citizen in a foreign country and who acts only when a hostile situation develops.

Social Engineering

The term given to attacks aimed at the weakest part of any IT security system, which is the end user. These are attacks that attempt to trick the user into responding, such as a link to something of interest. Social engineering uses a range of devices from phishing email to luring people to terrorist organisations. It relies on manipulating people into cyber espionage or to behave in a certain way.

Software

A set of programs that tell a computer to perform a task. These are compiled into a package that users can install and use. For example, Microsoft Office is an application software.

Spam

Spam is a common ethical hacking terminology used to refer to any unwanted or unsolicited email from the internet.  Some are harmless and aimed at promoting products or advertising goods. But others are used to spread malware or steal sensitive data through phishing emails. Spammers collect email addresses from the internet using web scraping tools.

Spoofing

Email spoofing is the term used by cyber types where an attacker changes slightly the headers of an email to make it look like it came from a legit source that you trust, like your bank. IP spoofing is where an illegitimate data packet is sent over a network by modifying its sender address to look like it’s from a trusted host. Spoofing is a deliberate attempt to give access to information you don’t want to give out.

Spy

Spies are people with access to valuable information. Also called agents or assets, they may volunteer to spy or someone will recruit or blackmail them to pass information.

Spyware

Aptly named, software designed to monitor your computer to detect other software intending to steal data.

SQL Injection

SQL injection is a very common type of website hacking where an attacker inserts malicious SQL statements through forms to be executed by the application. It is so common that a proper penetration test should not omit SQL injection vulnerability tests. I

Target of evaluation

Target of evaluation is one of the most common ethical hacking terminologies used to refer to any system, network, application or software that is the subject of a security analysis or attack. Linked to the good guys, supposedly.

Traffic Analysis

Methods for gaining intelligence from the patterns and volumes of messages.

Trojan horse

A piece of malware that often allows a hacker to gain remote access to a computer through a “back door”.

Virus

A virus is a hacking terminology used to refer to malware that replicates itself and can destroy or corrupt your system.

Visual hacking

Visual hacking is an in-person form of hacking that takes advantage of poor security by end-users. Usually overcome by cybersecurity training for employees. Examples of visual hacking opportunities. include logged-in, unattended computers and passwords taped to monitors.

Virtual Private Network (VPN)

A tool that allows the user to remain anonymous while using the internet by masking the location and encrypting traffic.

Vulnerability

The crack in the system which allows a hacker to enter.  Vulnerabilities can come from visual hacking,  planted code, or just weak spots in your system.

Whitehat

Someone hired to break into a system intentionally to find its weakness and vulnerability. Also known as penetration testing. In the cyber world, WhiteHats are good guys, most of the time.

Worm

A word is a type of virus that sits on your active system memory and duplicates itself but does not alter system files or data. As invisible as those in the garden buried deep beneath the surface of the flower bed.

XSS

XSS, also known as cross site scripting, is a web security vulnerability that enables a hacker to inject malicious client-side JavaScript code into web pages viewed by users.

Zero-day attack

A zero-day attack or zero-day exploit is simply the use of a previously undiscovered flaw in an application or operating system to gain access to or control system resources. The term zero-day refers to the fact that it is the day on which the attack or exploit was first identified. For more cyber security terms re

The #1 Magic of Tweaking: Perfecting Systems in an Imperfect World and How They Are Used by Writers

The #1 Magic of Tweaking: Perfecting Systems in an Imperfect World and How They Are Used by Writers

The #1 Magic of Tweaking: Perfecting Systems in an Imperfect World and How They Are Used by Writers

In a world where precision reigns supreme, the art of tweaking emerges as a powerful tool. Whether adjusting the timing of catching a train or refining complex systems, tweaking offers a pathway to improvement where the status quo falls short.

Consider the everyday scenario of getting to a meeting. You arrive at the station, only to find the schedule slightly off-sync, or rail closures. If it’s a regular trip, tweaking comes into play. By making small adjustments to the schedule or route, checking ahead or leaving just that bit earlier, you’re back on track.

Similarly, in systems and processes, tweaking serves to fine-tune and optimise. Whether refining algorithms in programming as distribution platforms like Amazon do all the time, or adjusting parameters in manufacturing, small tweaks lead to significant improvements.

Take Alexander Fleming. In 1928 this tweak in performance led to life-changing discovery. While away on holiday, he returned to find a petri dish contaminated with mould. Upon closer inspection, he noticed something extraordinary: the mould, Penicillium notatum, inhibited the growth of nearby bacteria. This chance observation sparked the idea of harnessing the mould’s antibacterial properties. Fleming’s accidental discovery led to the development of penicillin, the world’s first antibiotic, revolutionising medicine and saving countless lives.

Thomas Edison’s deliberate fine-tuning in inventing the electric light bulb is a better example of tweaking. Over years of experimentation, Edison and his team meticulously tested various materials for the filament, vacuum levels inside the bulb, and glass compositions. Through countless trials, they eventually perfected a commercially viable electric light bulb, fundamentally transforming illumination technology.

However, while tweaking works well with systems, its efficacy diminishes in human interactions. Unlike systems, people are dynamic and nuanced. Tweaking interpersonal relationships requires a delicate touch as individuals respond differently.

In relationships with friends, family, and colleagues, the challenge lies in navigating human emotions and preferences. A small tweak can have far-reaching effects, making the process a delicate balancing act.

Moreover, people pick up on subtle changes, making it challenging to implement tweaks without resistance. Perhaps you react slightly differently to a question.  Or you find out someone has been twisting the truth. You might tweak things – step back a bit or reassess your reactions. But it is trickier with people.

In conclusion, while tweaking is perfect for systems, its application in human relationships requires a nuanced approach. Recognising complexities and understanding human reactions and motivation can help, but it’s a tougher call.

Navigating Human Behaviour in Writing Thrillers By Tweaking

Similarly every twist and turn could mean life or death, the art of tweaking emerges as a vital tool in the arsenal of a thriller writer. Whether it’s adjusting the timing of a suspenseful reveal or fine-tuning the intricacies of a plot twist, tweaking offers a pathway to perfection in a world teeming with imperfections.

Imagine this: you’re on the edge of your seat, heart pounding, as the protagonist races against time to uncover the truth. But wait, the timing’s off, the tension’s waning. That’s where the art of tweaking swoops in to save the day. A subtle adjustment here, a calculated tweak there, and suddenly, you’re back on the edge of your seat, eagerly devouring every word.

Similarly, in thriller writing, tweaking is more than just a skill—it’s a way of life. Fine-tuning character motivations, adjusting plot points, it’s all part of the game. And let me tell you, those small tweaks can mean the difference between a forgettable story and a pulse-pounding page-turner.

Investigating the mysteries of the human mind through tweaking presents new challenges. Unlike plot devices, people are unpredictable, nuanced creatures. Tweaking character dynamics requires finesse, a delicate touch to navigate the murky waters of human emotion.

In the world of thrillers, relationships are the fuel that drives the story forward. Allies can become enemies in the blink of an eye, and enemies can become allies with the right persuasion. It’s a delicate dance, one that requires the utmost skill and cunning to execute.

 

 

Al Qabas Review of Our Man In Kuwait:   Dr. Faisal Alwazzan

Al Qabas Review of Our Man In Kuwait: Dr. Faisal Alwazzan

Al Qabas, Kuwait.  

In November 2022, a spy novel titled “Our Man in Kuwait” was released by the British author Louise Burfitt-Dons. The title is reminiscent of the famous novel “Our Man in Havana” (1958) by Graham Greene. While browsing through an online bookstore, I stumbled upon this book, which quickly gained a lot of admiration and positive comments, receiving high ratings. For me, the fact that the novel is related to Kuwait is reason enough to buy it immediately and start reading it on the same day it arrived. I then proceeded to write my impressions about it directly after finishing it a week later.

Here is my quick impression after reading it once.

The novel “Our Man in Kuwait” consists of 319 pages in a medium-sized format, divided into 58 chapters. The story primarily takes place in Kuwait, specifically in the area near the oil fields known as Ahmadi. Ahmadi was home to an English-American community that worked for the Kuwait Oil Company (KOC). The company had been drilling oil wells and exporting oil since 1946. The Ahmadi area also housed Kuwaiti, Indian, and Palestinian workers who had their own residences there.

The events of the novel take place in the second half of 1960, during the Cold War between the Western camp led by the United States and Britain, and the Eastern camp led by the Soviet Union. It coincided with the formation of the United Arab Republic, which included Egypt and Syria. Most importantly, it was a year when Iraq, the northern neighbour of Kuwait, was ruled by Abdul Karim Qasim, a communist military leader who overthrew the ruling Hashemite monarchy and executed them in 1958. These events, along with others like the Tripartite Aggression against Egypt, pushed the Kuwaiti society to engage more in politics and pay attention to ideologies, listening to the active Arab nationalist media. Nationalist ideas spread strongly among Kuwaitis and Arab residents, while Kuwaiti local ideologies were weak or absent, limiting and balancing the nationalist thinking within acceptable and reasonable boundaries.

The author chose Kuwait as the backdrop for one of the espionage operations between the two camps. At that time, Kuwait was still under British protection, while Iraq was supported by the Soviet Union with its communist ideology. The events of the novel unfold amidst the concerns of Kuwaiti and Western societies in Kuwait regarding a possible Iraqi invasion to expel the British and Americans and replace Western influence with Soviet influence.

The novel tells us about the activities of secret groups with political loyalty to Iraq that infiltrated both Kuwaiti and British-American societies in Ahmadi. Their members were among the employees of the oil company, and their mission was to pave the way for the Iraqi invasion by conducting espionage on Kuwaiti oil fields, sending maps and photographs, monitoring the movements of senior British and American officials, planting explosives, smuggling chemical weapons from Iraq to Kuwait, assassinating certain figures, burning oil wells to darken the sky and prevent British air forces from targeting the Iraqi ground forces, distributing publications inciting against the ruling family in Kuwait and casting doubt on it, and other publications inciting the expulsion of the English. Additionally, they attempted to recruit Kuwaiti elements to join the Iraqi project and reject Kuwait’s future independence.

The author captures the essence of Kuwait’s strategic position, which has been established by its geographical location in the centre of the world, on the dividing line between the superpowers. Since pre-Islamic times, Kuwait (and the Arabian Peninsula) has been a battleground for conflicts between major powers, witnessing political and military operations driven by this struggle. History has recorded many battles fought in Kuwait between the Persians, Romans, and Kindah over influence and caravans. In the Islamic era, the villages of Kazma and Failaka, populated by civilized people, fell victim to the Abbasid Jannabi (Qarmatian) conflict in the early 10th century AD, a period I personally wrote a novel about titled “Hadith Kazma,” which will be published soon. The list goes on, mentioning how Kuwait’s land has been affected by international conflicts throughout history.

However, what concerns us in this article is the novel “Our Man in Kuwait,” in which the author delves into the events by shedding light on the daily lives of several English and American families consisting of parents and children attending the Ahmadi school. The author portrays the daily routines of these families and describes their lavish lives filled with parties, sports activities, and social events in the numerous clubs they have established, the most important of which is the Hubara Club where Western families gather. They enjoy swimming in its large pool, dining on the finest cuisine in its restaurant, drinking alcoholic beverages from its bar, and dancing to fast and slow-paced songs. The author focuses intensely on the interests of English housewives, their fascination with gossip, rumours, typical domestic and telephone conversations, reciprocal visits, and the relationships between their children. The author not only depicts the social lives of the English, but also vividly portrays the landmarks of Ahmadi, describing its small houses with gardens and Indian servants, and providing detailed descriptions of its streets, hospital, laboratory, central market, golf courses, tennis courts, and other landmarks.

The Author in Ahmadi

It is no surprise that the author herself, Louise Byres (later Burfitt-Dons after her marriage), was a member of this community in the 1950s and 1960s. She was born in Ahmadi in 1953 at the Southwell Hospital, and grew up in 5 Main Street, Ahmadi, attending the Anglo-American School of Ahmadi. Her father, Ian Byres, of Scottish origin, worked in the Preventive Health Administration of the Kuwait Oil Company. Her mother was the director of the kindergarten in Ahmadi. Louise Burfitt-Dons states that she and her family experienced fear from the threat of Iraq to Kuwait in the period before and after Kuwait’s independence, and rumours circulated among them about Abdul Karim Qasim’s intention to invade Kuwait. The author describes the events of her novel as fictional but based on facts. Among these facts is the visit of the famous novelist and author of the James Bond novels, Ian Fleming, to Kuwait at the request of the Kuwait Oil Company to write about the prosperous country. The author recalls that her father received Fleming in their home and went on a desert hunting trip with him.

The main protagonist of the novel is Gordon Carlisle, who works, like Louise’s father in reality, at the Southwell Hospital in Al-Magwa, which is part of the Health Administration of the Kuwait Oil Company. He keeps a collection of wild animals that he studies in glass cages at his workplace. He is a newlywed man married to a beautiful and headstrong woman named Anita, who has political and social ideas that differ from his own. Despite that, he is infatuated with her and turns a blind eye to her peculiar behaviour. Gordon works with a group of Palestinian employees, the most important of whom are Mansour and Najib. His manager is John Dickson, who suddenly sends a British journalist and secret agent from British intelligence named Pip Foster to turn Gordon Carlisle’s life and the English community in Ahmadi upside down. Gordon discovers that the Soviets have established a small facility in the northern Kuwaiti desert to store chemical materials that can be used as weapons. He also discovers outbreaks of anthrax bacteria and begins to trace their source, leading him to the carpet market in Kuwait City and some Bedouins who weave the Sadu rugs across the Iraqi border, as well as to that secret desert facility.

The novel tells us about the increasing activity of communist agents loyal to Iraq of Palestinian and Iraqi nationality in Ahmadi and Kuwait, and their connection to a Soviet agent residing in Kuwait named “Alex,” who manages their intelligence and military activities aimed at destabilizing security and paving the way for the Iraqi invasion supported by the Soviets. In November, the author of James Bond novels, the renowned writer Ian Fleming, visits Kuwait to write about the country. Additionally, he maintains a relationship with the British Naval Intelligence, and he evaluates the security situation in Kuwait and has a conversation with Gordon Carlisle. Fleming meets Gordon and they go together to the desert for a hunting trip.

The story becomes more complex after the assassination of one of Gordon’s friends, who was an operative with British intelligence, and who revealed to Gordon about a sabotage cell. This is followed by the death of John Dickson’s wife (Ophelia), who was previously involved in a romantic relationship with Gordon, and then an explosion at the storage facility of Southwell Hospital where Gordon works, resulting in the death of one of the Palestinians inside. Later, Ian Fleming himself becomes the target of an assassination attempt in the desert during the hunting trip. The novel reaches its climax with the terrorists kidnapping an English girl who witnessed the assassination of Gordon’s friend. Gordon is accused by the Kuwaiti and British police of being the Soviet agent and the one behind all these troubles. Then a rapid series of surprises unfolds at the end of the novel, revealing the mysteries that were introduced at the beginning and middle. The novel ends in December, six months before the “Operation Vantage” after Kuwait’s independence on June 16, 1961. In this military operation, British forces arrived at the request of the Emir of Kuwait, Sheikh Abdullah Al-Salem Al-Sabah, to defend the country after the Iraqis had gathered their army on its borders.

The author relied on the omniscient narrator as a storytelling tool and transitioned through scenes. However, the majority of the text was dominated by dialogue. The dialogue stands out for its smoothness and adherence to the way English was spoken in the 1950s. It seems that the author’s memory is vivid, and she succeeded in utilizing what remained in her memory to write this fascinating and convincing narrative. She was also inspired by the character of Kim Philby, the famous British spy who defected and betrayed Britain to join the Soviet Union. It has been said that Kim Philby worked in Beirut, which was a hub for spies, and visited Kuwait and some Gulf Emirates.

Mustafa Al-Sabah.. A fictional character

The author refrained from extensively portraying the lives of Kuwaitis in the city and instead introduced the character of Kuwaiti officer “Mustafa Al-Ramz Al-Sabah,” who is a fictional character. She tells us that he studied at the prestigious Sandhurst Military College in England, is fluent in English, highly intelligent, diligent, patriotic, and works on maintaining security in Kuwait and preparing special military forces (commandos) to defend Kuwait against a potential Iraqi invasion. He also participates in monitoring and arresting communist sabotage groups loyal to the Iraqi regime. The novel also hints at the urban and cultural renaissance in Kuwait in recent years.

The author’s political orientations and inclinations are prominent in this novel. She stands with Britain and its values against the Soviet Union and its principles. In reality, the author is a member of the Conservative Party, has participated in parliamentary elections in her country, works as a social activist, leads an anti-bullying media and educational campaign, and has initiated a media campaign to support Britain in various fields. She has also worked as a playwright and novelist and pursued acting in Australia, where her New Zealand husband resided, before settling in London.

Will it be translated into Arabic?

The novel “Our Man in Kuwait” is truly enjoyable, well-crafted, and intelligent. It skilfully blends reality and fiction, deserving careful reading and detailed critical analysis. I hope to succeed in translating it into Arabic in the near future after signing a contract with the publishing and distribution company, “Thāt al-Salāsil,” a month ago.

This novel reminded me of a Kuwaiti novel titled “No Music in Al-Ahmadi” by Kuwaiti novelist Mona Al-Shemari, which was successfully adapted into a television series. I hope that all regions of Kuwait receive the stories and novels they deserve, infused with spirit and charm. In conclusion, I would like to thank Louise Burfitt-Dons for sharing her memories and imagination about Kuwait during one of its pivotal historical periods.

Palestinians and the Kuwait crises of 1960 and 1990

The novel also reflects the author’s scepticism about the loyalty of Palestinian elements who, according to her description, were willing to sacrifice Kuwait in order to reclaim Palestine. This idea is conveyed through the words of the Kuwaiti police commander, whom she portrays as aware of this Palestinian inclination. However, the reality was different, as Kuwaitis placed great trust in Palestinians, especially their leaders, officials, and intellectuals. Despite the negative stance of the majority of Palestinians during the Iraqi invasion of Kuwait in 1990, the Palestinian cause continues to be their top priority in terms of political interests, and it remains a winning card for their politicians. The significant resemblance in the behaviour of some Palestinians during the Kuwait and Iraq crises in 1960 (as portrayed by the author in the novel) and in 1990 (as described in the documents of the Kuwaiti resistance) is remarkable. It seems evident that the author benefited from the information about what Iraq did to Kuwait during the Iraqi occupation of Kuwait in 1990-1991, and she projected some of the destructive details and behaviours onto the communist saboteurs during the 1960s era. The author mentioned at the end of the book that she read and gained insights from John Levin’s book, “Days of Fear,” about the Iraqi occupation of Kuwait in 1990-1991.

Link to the original article

 

 

Playlist: 12 awsome songs which inspired Our Man In Kuwait

Playlist: 12 awsome songs which inspired Our Man In Kuwait

 Playlists on Spotify: How and why to make one when writing.

There are many examples of music that inspired famous novels. Here are a few notable ones:

  1. “The Great Gatsby” by F. Scott Fitzgerald was inspired by jazz music. The novel’s protagonist, Jay Gatsby, is a wealthy socialite who throws extravagant parties in the 1920s. The jazz music of the time played a significant role in the novel’s setting and themes.
  2. “One Hundred Years of Solitude” by Gabriel Garcia Marquez was inspired by Latin American folk music. The novel is set in a fictional town in Colombia and incorporates elements of magical realism. Marquez was heavily influenced by the music and culture of his home country.
  3. “The Catcher in the Rye” by J.D. Salinger was inspired by popular music of the 1940s and 1950s. The novel’s protagonist, Holden Caulfield, is a rebellious teenager who feels disconnected from the world around him. Salinger used music as a way to convey Holden’s feelings of isolation and disillusionment.
  4. “Norwegian Wood” by Haruki Murakami was inspired by The Beatles’ song of the same name. The novel is set in 1960s Tokyo and follows the story of a college student named Toru Watanabe. The Beatles’ music plays a significant role in the novel, and the characters often discuss the band and their music.
  5. “The Name of the Rose” by Umberto Eco was inspired by Gregorian chants. The novel is set in a medieval monastery and follows a Franciscan friar named William of Baskerville as he investigates a series of murders. The Gregorian chants that the monks sing play a significant role in the novel’s atmosphere and themes.
ian fleming

Why music when you’re writing a book? Doesn’t silence reign?

When you’re writing a novel, its not bad idea to have a list of music which inspires and excites your imagination.  It’s a quick way to return you to the mode quicker than anything else.

Inspiration for Our Man In Kuwait came much from my childhood. This spotify playlist ranges from from The James Bond them to the Inkspots.

There are several reasons why writers may use music to inspire their novels:

  1. Emotion:  Listening to music that matches the mood or tone of a scene or character can help tap into those emotions and infuse them into the writing.
  2. Creativity: Music can help break through creative blocks. The rhythm and melody of a song can inspire new ideas.
  3. Setting: Music can help writers establish the setting and atmosphere. In Our Man In Kuwait I was trying to capture 1960 in Ahmadi, Kuwait. Listening to music from back then helped me  immerse myself in the past.
  4. Characterisation: The type of music a character listens to can reveal a lot about their personality, values, and background. Some of these songs are actually part of the background of the story of Our Man In Kuwait.

How to make a spotify playlist

Open the Spotify app on your desktop or mobile device.

Click on “Your Library” in the left-hand menu on desktop or the bottom menu on mobile.

Click on “Create Playlist”.

Give your playlist a name and optionally add a description and cover art.

Begin searching for and adding songs to your playlist by either typing in the search bar or browsing through recommended songs or playlists.

To add a song, simply click on the “+” icon next to the track.

Continue adding songs until you’ve built the playlist you want.

Save the playlist by clicking the “Create” button (on desktop) or “Done” button (on mobile).

Your new playlist will be available in the “Playlists” section of your Spotify library, where you can access it anytime and play it on your device or share it with others.

 

spotify
  1. Finlandia: Sibellius    (the record Ophelia Dickson leant Gordon Carlisle)
  2. The Talk Of The Town: Ray Conniff Singers (Played at Golf Dance)
  3. Quizas, Quizas, Quizas: Nat King Cole
  4. Goldfinger: Shirley Bassey  (Ian Fleming arrives in Kuwait)
  5. Stranger in Paradise: Tony Bennett from Kismet (heard by Sylvie when she runs away)
  6. Smoke Gets In Your Eyes: The Platters (Popular song. Is Gordon blindly in love)
  7. Alf Leila We Leila: Umm Kulthum (heard over the radio by Brigadier General Mustafa al-Ramiz al-Sabah)
  8. James Bond Theme: The City of Prague Philharmonic Orchestra  (into the desert)
  9. Into Each Life Some Rain Must Fall: The Ink Spots (Played at Carlisle dinner party)
  10. From Russia With Love: Matt Munro  (Who is Agent Alex?)
  11. As Time Goes By: David Kates
  12. Rockin Around The Christmas Tree: Brenda Lee (Jean Beresford’s Christmas choice)

 

Kuwait Behind the Scenes of a Thriller

Kuwait Behind the Scenes of a Thriller

Kuwait Behind the Scenes

Our Man In Kuwait is a work of fiction but  the political thriller was inspired by what happened behind the scenes of life at the time.

Operation Vantage OMIK
I was born and brought up in Kuwait and I vividly recall the period and what it was like living under the threat of invasion by Iraq in 1960 and 1961. My father, Ian Byres was the Preventative Health Officer for the Kuwait Oil Company based in Ahmadi.

At the end of 1960 Ian Fleming came to Kuwait to write a book about the oil industry which was commissioned by KOC. Due to objections by the Kuwaiti Government it was never published.

During the stay he got to know my father very well and spent many days at our bungalow at 5 Main Street. They had much in common. Both had the same Christian names, were of Scottish extraction and shared a great interest in exotic creatures which sometimes broke loose from my father’s personal zoo. I recall one contest between a viper and scorpion on our green carpet when Ian Fleming was there. He went out with my father on one of his hawking expeditions into the desert which he later described as one of the highlights of his time in Kuwait.

During that period the great charmer Kim Philby, based in Beirut, made a tour of the Gulf States including Kuwait and he modelled for the character of Pip Foster in Our Man In Kuwait.

Philby himself eventually defected to the Soviet Union in 1963 when doubts about his loyalty were about to be confirmed by US and British secret services. His defection shocked the tight expat community of Ahmadi at the time who felt it reflected on their own integrity.

 

“Whitehall’s greatest fear was that domestic unrest, primarily in Kuwait but also in Iraq, could endanger the flow of oil to the United Kingdom.”

CDR Richard A. Mobley, USN, (Ret.)

Kuwait Behind the Scenes through political eyes…

In 1958, Abdul Karim Qasim seized power in Iraq, the Hashemite monarchy established by King Faisal I in 1921 under the auspices of the British. King Faisal II, Prince Abd al-Ilah, and Prime Minister Nuri al-Said as well as many other members of the Iraqi royal family were murdered by the military. Baghdad Radio announced that the Army had liberated the Iraqi people from domination by a corrupt group put in power by “imperialism”.

The Hashemite regime had been a reliable ally of the West as it tried to hold back the Soviets. The change of power produced a volatile situation. Uncontrollable mobs took to the streets of Baghdad. Several foreign nationals staying at the Baghdad Hotel were killed in the chaos that followed. The British Embassy was ransacked and a member of staff killed in the process. Iraq became a republic.

Government decision making in Iraq centered around Qasim, who … ‘gives many who meet him the impression that he is verging on madness.’

CDR Richard A. Mobley, USN, (Ret.)

Cross currents of communism, Arab and Iraqi nationalism, anti-Westernism and the ‘positive neutrality’ of President Gamal Abdel Nasser of the United Arab Republic played out their effects in the region. This raised fears of a domino effect and that the pro-Western oil regime of Kuwait would fall to united Arab nationalism. By March 1959 Iraq withdrew from the Baghdad Pact, a military alliance between Iran, Iraq, Pakistan, Turkey and the United Kingdom. In its place it created new alliances with left-leaning countries, including the Soviet Union. Because of their agreement with the USSR, Qasim’s government allowed the formation of an Iraqi Communist Party.

The JIC convinced Whitehall the risk of invasion was high and… precipitated the dispatch of British military units to Kuwait during July 1961.

CDR Richard A. Mobley, USN, (Ret.)

In 1960, an Arab League declaration repositioned the Iraq-Kuwait border two miles north of the southernmost tip of Iraq’s Rumaila oil field. This led to an ongoing dispute made worse when Iraq alleged that Kuwait-based drilling was tapping into their oil fields.  On 25 June 1961, after Britain handed over authority to Kuwait, Qasim announced that Kuwait would be incorporated into Iraq. As well as massive oil reserves, the State of Kuwait had broad access to the Persian Gulf. The military threat resulted in a call by Sheikh Abdullah III Al-Salim Al-Sabah for British protection. Operation Vantage was launched on 30 June 1961. Air, sea and land forces were in place within days.

The Secretary of the Cabinet railed against having to rely on soft, uncorroborated reporting…[including] ‘alarmist bazaar rumors of Qasim’s intentions.’

CDR Richard A. Mobley, USN, (Ret.)

The Kuwaiti combat contingents were led by Brigadier General al-Jaber al-Sabah and Colonel Saleh Mohammad Al-Sabah. They commanded the Kuwait 25th Commando Brigade and the Kuwait 6th Mechanised Brigade. Iraq did not attack and British forces were replaced by those of the Arab League. The UK had withdrawn completely by 19 October 1961. Qasim was killed in a coup in 1963 and Iraq recognised Kuwaiti independence. The military threat receded but Britain kept forces in abeyance until 1971. By mid-1970, Iraqi military presence along the border with Kuwait had increased but indicators of imminent danger were not present and British troops left the Gulf in 1971 as planned.

Of key importance, UK leaders were predisposed to heed intelligence warnings.

CDR Richard A. Mobley, USN, (Ret.)

 

Kuwait Behind the Scenes from Whitehall’s Perspective

The Kuwait crisis convinced the British Government that the security of the Persian Gulf was above all endangered by the President of Iraq, Abd al-Karim Qasim. As a result, a new defense plan for Kuwait was endorsed by the British Cabinet in October 1961.  This plan – code-named  Sodabread – had significant consequences for the scale of Great Britain’s military deployment in the Persian Gulf, as it provided for a larger military force stationed in the area. The existing military base in Bahrain was strengthened and new accommodation for the additional troops was constructed on the island.

 

Links

British Policy In the Persian Gulf by Helen von Bismark

10 Top Political Thrillers set in Westminster

10 Top Political Thrillers set in Westminster

10 top political thrillers set in Westminster.

My own foray into writing political fiction began  after  a long term involvement with the Conservative Party which saw me standing as a candidate for them in Nottingham North in 2015.  There’s nothing like hands on experience to be able to give the detail you need to write plausible characters and behaviour.  But had I taken inspiration directly from well-trodden paths then here are ten of the top political thrillers set in Westminster.

Westminster political thrillers
westminster politics
Westminster speechmaker
Politics in print
  1. “House of Cards” by Michael Dobbs – This classic novel, which has been adapted into several successful television series, tells the story of a ruthless politician’s rise to power in the British government.
  2. “The Ghost” by Robert Harris – This thriller follows a ghostwriter tasked with finishing the memoirs of a former British Prime Minister, only to uncover a web of secrets that could endanger his own life.
  3. “A Very British Coup” by Chris Mullin – In this novel, a left-wing politician unexpectedly becomes Prime Minister, but finds himself up against a powerful establishment determined to thwart his plans.
  4. “Secret State” by Chris Mullin – This sequel to “A Very British Coup” sees the same protagonist facing new challenges as he tries to steer Britain through a crisis involving nuclear power.
  5. “The Night Manager” by John le Carré – Although not set in Westminster itself, this spy thriller involves a British intelligence officer attempting to bring down a wealthy businessman who is secretly arming rebel groups in the Middle East.
  6. “The Chancellor Manuscript” by Robert Ludlum – This novel follows a former government employee who stumbles upon a top-secret document that could threaten the lives of many powerful figures in the British government.
  7. “The Fourth Protocol” by Frederick Forsyth – This Cold War thriller sees a rogue KGB agent attempting to smuggle a nuclear device into the UK, with the ultimate goal of disrupting the British political system.
  8. “The Day of the Jackal” by Frederick Forsyth – Although not set in Westminster, this classic novel tells the story of a hired assassin tasked with killing French President Charles de Gaulle, and the efforts of French intelligence to stop him.
  9. “The Constant Gardener” by John le Carré – In this novel, a British diplomat uncovers a conspiracy involving a pharmaceutical company and the deaths of African villagers, and must navigate the dangerous waters of international politics to bring those responsible to justice.
  10. “The Power Game” by Graham Masterton – This thriller sees a young MP become embroiled in a web of corruption and deceit as he attempts to uncover the truth behind a series of mysterious deaths in Parliament.

Some more books :

  • “The Prime Minister’s Secret Agent” by Susan Elia MacNeal
  • “The Westminster Poisoner” by David Dickinson
  • “The Intrusions” by Stav Sherez
  • “The Party” by Richard McGregor
  • “The Westminster Conspiracy” by M.J. Trow
  • “The Shadow District” by Arnaldur Indridason
  • “A Quiet Belief in Angels” by R.J. Ellory
  • “The Second Woman” by Kenneth Cameron
  • “The High Window” by Raymond Chandler
  • “The Darkening Glass” by Paul Doherty
  • “The Paddington Mystery” by John Rhode
  • “Deadly Election” by Lindsey Davis
  • “The Westminster Intrigue” by C.J. Sansom
  • “The Black Tower” by P.D. James
  • “The Queen’s Man” by Sharon Kay Penman
  • “A Question of Proof” by Nicholas Blake
  • “The Body Politic” by Paul Johnston
  • “A Capital Crime” by Laura Wilson

What is the meaning of political thriller?

Political thrillers are a genre of fiction that typically explores the political landscape of a nation or the world, often through the lens of a protagonist who is trying to uncover a conspiracy or prevent a catastrophic event.

Some of the common topics explored in political thrillers include:

  1. Government corruption and abuse of power
  2. International espionage and terrorism
  3. Assassinations and political intrigue
  4. Cover-ups and conspiracies
  5. Military and intelligence operations
  6. Political scandals and manipulation
  7. Diplomatic relations and international crises
  8. Economic espionage and corporate malfeasance
  9. Cybersecurity and cyber warfare
  10. Political and ideological conflicts.

These themes are often used to create a sense of tension and uncertainty, as the protagonist navigates a complex and dangerous world where the stakes are high and the consequences of failure can be dire. Political thrillers can be both entertaining and informative, offering a glimpse into the inner workings of government and the forces that shape our world.

The #1 Magic of Tweaking: Perfecting Systems in an Imperfect World and How They Are Used by Writers

The #1 Magic of Tweaking: Perfecting Systems in an Imperfect World and How They Are Used by Writers In a world where precision reigns supreme, the art of tweaking emerges as a powerful tool. Whether adjusting the timing of catching a train or refining complex systems,...

9 Fast Facts about Jihadi Brides

There is a lot of anger and discussion in public and in the media about women from Western backgrounds who joined a terrorist organisation. Here are 9 fast facts about Jihadi brides to consider in any debate.   #1: Fast Facts About Jihadi Brides.Why did they...
suspense in political thrillers
political thrillers in fishnets
Politics in print

Are the top political thrillers written by people with real life experience?

Not all of the above listed have been written from personal experience. And last year I was  interviewed by Ben Shepherd on some of the background to my first political thriller The Missing Activist and how it measured up to other books I’d read. Read the blog post The best political thrillers to spill the beans on the system on Shepherd.com 

Louise Burfitt-Dons, best selling author of thriller fiction

Subscribe To My Newsletter To Stay In Touch

Join my mailing list to receive the latest news and updates. 

Thank you for your subscription.