Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
About this deal
Dune II: The Building of a Dynasty". ClassicReload.com. February 17, 2014. Archived from the original on September 21, 2020 . Retrieved May 23, 2020.
In Children of Dune, Leto II consumes massive amounts of spice and allows many sandtrout to cover his body, the concentration of spice in his blood fooling them. This layer gives Leto tremendous strength, speed, and protection from mature sandworms, which mistake his sandtrout-covered body for a lethal mass of water.  He calls it a "living, self-repairing stillsuit of a sandtrout membrane", and soon notes that he is "no longer human".  Those questions fell to Drew Robinson, a malware analyst at iSight. It would be Robinson’s job to follow the clues within that PowerPoint to solve the larger mysteries of the hidden operation it represented. On June 27, 2017, something strange and terrible began to ripple out across the infrastructure of the world.Richard Clarke, former White House counterterrorism coordinator, author of The Fifth Domain and Cyber War the book provides technical details where you can actually understand how the group did what they did, rather than relying on simple metaphors like 'logic bombs'
Sandworms are attracted to rhythmic vibrations in the sand, which they mistake for prey (smaller sandworms).  To escape the notice of the sandworms, a traveller in the desert must learn to "walk without rhythm" in a manner that simulates the natural sounds of the desert. This element comes from Frank Herbert's experiences as a hunter and fisherman. He knew how to mask his presence from prey by techniques such as approaching from downwind and treading lightly.  Frank Herbert's son Brian explained that "In Children of Dune, Leto II allowed sandtrout to attach themselves to his body, and this was based in part upon my father’s own experiences as a boy growing up in Washington state, when he rolled up his trousers and waded into a stream or lake, permitting leeches to attach themselves to his legs." I grew up reading and watching science fiction and horror so I learned to compartmentalize from "real life." But Greenberg's description of actual events in this cyber connected world has caused me to take action to change my use of certain software and technology. At the end of the book, there is a hint of how to be more resilient and survive the possible future disruptions.