Monthly Archives: February 2016

On Writers

PoeIn planning my approach and questions for my upcoming interview series, Under the Covers: Close and Personal with Six Hot Authors, I thought a lot about writers and our place in the world.

Above all else, writers—by which I mean those who complete and publish work with some consistency, not the scribbler who never actually finishes anything—are generally some of the most interesting people you’re likely to meet. They’re invariably intelligent, often painfully so. They read compulsively and omnivorously. They think all the time, typically about things that others don’t. They spend a lot of time looking deep into the human mind and heart, often into the darker corners that most of us shy away from. And though it may not be apparent to most people, writers work hard: the creation of a book from nothing takes monumental effort. It’s like building a house from the ground up. Alone.

This doesn’t make writers better people than others. It certainly doesn’t make them easy people to live with (ask any writer’s partner), although there’s bound to be the occasional exception to the rule. As a class, we’re often shy and introverted; but when talkative, our unrelenting curiosity can prompt us to ask the most personal questions of a complete stranger. Like a doctor, the writer is used to spending time probing people’s insides (in our case, their heads and hearts), and consequently is liable to just ignore convention and social niceties to get to the point.

Writers live in their heads. We spend a lot of time staring at walls. Life circumstances permitting, we’re often unproductive for long periods, then burn like an acetylene torch for a period of weeks or even months. Insomnia is a common thread; doubt and insecurity too. But for all their apparent brittleness, the seasoned writer is a very resilient creature: those that aren’t, break.

The staring at walls can, in my experience, be active or passive. When it’s active, it’s ideation, picture painting, world and character development, plotting, intense thought; when passive (though nothing a working writer does is really passive, it just looks that way), the writer is doing the delicate and intuitive work maintenance work on the connection with their subconscious, keeping the channel dredged and clear so that upwelling material can flow unimpeded into the conscious mind, from which it can be shaped and find its way onto the page.

One of the hardest things for many writers—and in my opinion one of the most important—is to remember to get out and spend time in the world. Quite apart from the need to maintain one’s physical health by walking and exercising, time spent out of doors, walking and looking around and talking to people, recharges and replenishes us, especially when we make a regular time for it; that way it becomes a routine part of our day, a scheduled and welcome break rather than an annoying interruption to our work.

In formulating my questions for the six writers in my Under the Covers project, I considered what was known publicly, who their audience is, and their body of writing. I read some of their work that I hadn’t before, re-read some pieces I had, and looked up some prior interviews they’d done, paying especial attention to the frequently asked questions as well as the missed opportunities and cues. An interview which just recycles bio information or facts you can find in a Wikipedia entry or Amazon author page isn’t much good to anyone. I want to know what makes these writers tick, what made them who they are, what makes them pause and think hard, what makes them laugh, what saddens them.

Whether I succeeded or not you’ll have to judge for yourself. I’ve certainly learned a lot about each of these authors, and am now even more interested in each than I was before. I have enormous respect for each and every one of them. Whether this is your first introduction to these authors or you’re already a hardcore fan, I hope you find reading this series as interesting as I did putting it together.

 

Under the Covers: Close and Personal with Six Hot Authors begins on Saturday March 5.

Leave a comment

Filed under Books and Writers, interviews, Writing

The road Most Traveled: Good Intentions, Catastrophic Results

A Federal judge has just ordered Apple to unlock the phone used by one of the two San Bernardino shooters so it could access the phone’s records. Apple’s CEO Tim Cook has said the company will fight the order, stating that it has neither the ability to bypass its own strong encryption and that this would set a dangerous precedent. Although I’m not an Apple user, I’m 100% with the company on this and applaud their decision.

The question here is a simple one of the road to hell. It all begins, as usual, with good intentions: we want to stop terrorism. But as Apple CEO Tim Cook said, “building a version of iOS that bypasses security in this way would undeniably create a back door. And while the government may argue that its use would be limited to this case, there is no way to guarantee such control.”

Yet we continue to jog blissfully into an Orwellian future in which the state (the UK is no different) not only insists but has also persuaded a good many of its citizens that their lives are in dire and imminent danger from foreign threats, and that any violation of privacy or individual freedoms is secondary to fighting that threat. Politicians of course make huge capital on this, and the media does nothing to bring some perspective and reality to the actual real threats to our daily lives, which for most people are to do with poor education, debt, poverty, ill health, unaffordable housing, the criminal cost of healthcare, and long-term insecurity—not terrorism.

The US has been in a state of perpetual war for over thirteen years, and continues to be. Its misguided foreign policy actions have destabilized a huge region of the world by trying to impose Western notions of government on nations utterly ill-equipped to embrace democracy (you have to have an Enlightenment before you can consider democracy, and when you still think tribally, corruption and self-interest are going to quickly corrode and ruin any attempt at forging a new state).

Saddam was undoubtedly a brute, and Bashir-al Assad (still in power today) not much better; Gaddafi was mercurial and unreliable. But although some individuals and/or sections of those societies were persecuted during these leaders’ rule, the vast majority of people in Iraq, Syria, and Libya had jobs, food, and a reasonable, often happy and secure standard of living. Today they’re straggling across Europe by the millions like beggars, taking handouts and desperately looking for places to settle—and that’s if they haven’t drowned in the Aegean or Meduterranean after having been fleeced by a whole new class of local criminals our good intentions have benefited: people smugglers. In the process, the rest of Europe is being destabilized.

I fully understand that government has a primary mandate and responsibility to keep its people safe. But in reality, the risk from terrorism is infinitesimally small: if you live in the USA, your chance of dying in a terrorist attack is about 5,000 times less than that of being shot by a US citizen (and even that’s not something that keeps most of us awake at night). The simple act of getting on a plane has already become a tedious, time-wasting hell despite the fact that study after study has shown TSA checks to be up to ninety-five percent ineffective at detecting threats. If you live in a city, your actions while out in public are already recorded on countless cameras; your cellphone and the plastic in your wallet provide extra layers of tracking and monitoring. But government insists it needs a further backdoor into everyone’s lives, and argues tooth and nail that any level of  inconvenience and curtailment of individual privacy and liberty is justifiable.

Every day we see evidence of how the well-intentioned use of electronic records ruins lives. The undiscriminating and poorly-thought-out register of sex offenders is one: is it—to take just one example—really okay that because an eighteen-year-old had consensual sex with a seventeen-year-old, he should be viewed as a sexual predator in the same data bucket as a child molester? How many of my readers didn’t have underage sex of one kind or another in their high school or college days? And let’s not even talk of the teens whose lives have been upset by the (silly, but, hey! these are kids) practice of sexting one another.

The argument of course is that an honest citizen has nothing to fear from all this. Really? Try telling that to someone who’s been accidentally put on a no-fly list because of some data entry error or some other innocent reason (it happens). And although China’s new Social Credit System—a data-driven rating system similar to our own credit rating systems but with the emphasis on your status and trustworthiness as a citizen—isn’t likely to be replicated in the US  anytime soon, the reality is that all kinds of aggregated data, including your online browsing and shopping habits, are already finding their way into databases that can affect your ability to rent a home, get a job, obtain credit, and a great deal more.

Nor is it just government. PayPal has just clamped down on allowing account holders to use its system to pay for VPN (virtual private network) subscriptions, presumably on the grounds that VPNs, which are used to mask a user’s real computer identity (IP address), may be used for terrorist communication or other illicit activity. What about the many hundreds of thousands of people who use VPN for entirely legitimate activities such as researching sensitive subjects (journalists do this all the time), getting around censorship in countries under authoritarian rule, or simply  avoiding being tracked by advertisers. (PayPal are of course doing this not out of any noble motives but simply to forestall any possible future heat from government over enabling the masking of criminal communications).

Consider the slew of new voice- and audio enabled devices that are appearing in your home, like the Amazon Echo, which “hears you from across the room with far-field voice recognition, even with music playing”: do you really want that in your house? Even if it doesn’t come with a backdoor or a camera, what do we think happens to all the data it collects about our and our family’s daily habits? You don’t think that’s mined? Increasingly sophisticated AI can do that with ease and extract every ounce of commercially  valuable information about us.

You’ve already been carrying around a tracking device (your phone) for years. Within the very, very near future, your home is going to be bursting with microphone- and camera- equipped devices which are all connected to the net as part of the IoT, or Internet of Things. If you’re not concerned about this, you should be. Quite apart from any government surveillance, just about anyone can hack in to these devices. For a single, chilling example, the camera on the monitor in your childrens’ room is ridiculously easy to hack, its IP address quite possibly already on a website. Think about it.

Everything—everything—that takes place in your home and car will—unless tech companies hold a hard line, and good luck with that one—be available on production of a court order. Right now the bar is terrorism; but other, more everyday, criminal activities will soon qualify. How long before all that data becomes available to your ex’s divorce lawyer? What if your current prospective employers can one day gain access to the data mined from these devices? Because you can bet that it’s all going to be for sale, legally or otherwise. And don’t forget that security on the current IoT is just about non-existent (this is in fact a big concern with self-driving cars, which can currently be hacked with such ease that a person with a laptop can take control over the car with very little difficulty from anywhere in the world).

In conclusion, I believe that tech companies have an absolute responsibility to protect the rights and privacy of their customers at every level. Not only should devices not come with a backdoor, ever, but every possible measure should be taken to ensure that networked devices, from our phones to our cars, refrigerators, baby monitors, and home thermostats are protected against intrusion and hacking by strong encryption and security measures. The emphasis and primary focus should be on the inviolability of the consumers’ privacy and individual rights. And we should demand that of them.

After all, it is we, and our hard-earned dollars, that have made Apple, Google, and Amazon what they are today.

 

Leave a comment

Filed under Material World

UNDER THE COVERS: Close and Personal with Six Hot Authors

IN-DEPTH AUTHOR INTERVIEW SERIES

Here are the links to each of my Under the Covers interviews; enjoy!

Sara Alexi (Literary Fiction)

Aliette de Bodard (Science Fiction/Fantasy)

William Hertling (Science Fiction/Thriller)

Ken Liu (Science Fiction/Fantasy)

Mandy M. Roth (Paranormal Romance)

Loreth Ann White (Romantic Suspense/Thriller)

Under the Covers is a series of six weekly, in-depth interviews I conducted in March and April 2016 with six prominent and successful authors working in several distinct categories and genres. As both a reader and writer myself, I find it both fascinating and revealing to get a glimpse into other writers’ thoughts, feelings, and motivations.

What do these six authors have in common? First, they’re all terrific storytellers, which I view as the primary object of good fiction; second, each has attained a high degree of success and visibility in their chosen genre or category, including major awards and bestseller rankings on one or more lists; and third, they are all darned interesting people, with a lot to say.

This interview series digs in to find out what makes these authors tick: how each views the world, how they balance being a successful author with the demands of daily life, what drives their fiction and choice of genre, and how they found their success. In the process, I hope to interest each author’s current fans, as well as introduce them to you, my own readers.

You can also sign up for my RSS feed (left sidebar)

7 Comments

Filed under interviews