<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Rick's First Principles Newsletter]]></title><description><![CDATA[I study cybersecurity strategies that buy down business risk.]]></description><link>https://diffuser.substack.com</link><image><url>https://substackcdn.com/image/fetch/$s_!V0bx!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2838977-ba2c-4bcc-b61e-4ffc8e853d3a_500x500.png</url><title>Rick&apos;s First Principles Newsletter</title><link>https://diffuser.substack.com</link></image><generator>Substack</generator><lastBuildDate>Wed, 06 May 2026 16:45:55 GMT</lastBuildDate><atom:link href="https://diffuser.substack.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Rick Howard]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[diffuser@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[diffuser@substack.com]]></itunes:email><itunes:name><![CDATA[Rick Howard]]></itunes:name></itunes:owner><itunes:author><![CDATA[Rick Howard]]></itunes:author><googleplay:owner><![CDATA[diffuser@substack.com]]></googleplay:owner><googleplay:email><![CDATA[diffuser@substack.com]]></googleplay:email><googleplay:author><![CDATA[Rick Howard]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Forget Bletchley Park: America's Codebreakers Were Women]]></title><description><![CDATA[A Review of Liza Mundy's "Code Girls"]]></description><link>https://diffuser.substack.com/p/forget-bletchley-park-americas-codebreakers</link><guid isPermaLink="false">https://diffuser.substack.com/p/forget-bletchley-park-americas-codebreakers</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 04 May 2026 12:03:57 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!GR9X!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9eb8f7-6456-49a4-af8f-cad5f0302963_1023x1537.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GR9X!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9eb8f7-6456-49a4-af8f-cad5f0302963_1023x1537.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GR9X!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9eb8f7-6456-49a4-af8f-cad5f0302963_1023x1537.png 424w, https://substackcdn.com/image/fetch/$s_!GR9X!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9eb8f7-6456-49a4-af8f-cad5f0302963_1023x1537.png 848w, https://substackcdn.com/image/fetch/$s_!GR9X!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9eb8f7-6456-49a4-af8f-cad5f0302963_1023x1537.png 1272w, https://substackcdn.com/image/fetch/$s_!GR9X!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9eb8f7-6456-49a4-af8f-cad5f0302963_1023x1537.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GR9X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9eb8f7-6456-49a4-af8f-cad5f0302963_1023x1537.png" width="1023" height="1537" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef9eb8f7-6456-49a4-af8f-cad5f0302963_1023x1537.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1537,&quot;width&quot;:1023,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2941789,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/195910877?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9eb8f7-6456-49a4-af8f-cad5f0302963_1023x1537.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GR9X!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9eb8f7-6456-49a4-af8f-cad5f0302963_1023x1537.png 424w, https://substackcdn.com/image/fetch/$s_!GR9X!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9eb8f7-6456-49a4-af8f-cad5f0302963_1023x1537.png 848w, https://substackcdn.com/image/fetch/$s_!GR9X!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9eb8f7-6456-49a4-af8f-cad5f0302963_1023x1537.png 1272w, https://substackcdn.com/image/fetch/$s_!GR9X!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef9eb8f7-6456-49a4-af8f-cad5f0302963_1023x1537.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a><figcaption class="image-caption">Totally Fake Movie Poster that I made with ChatGPT</figcaption></figure></div><p></p><p>I&#8217;ll start with the verdict: the Cybersecurity Canon Committee got this one exactly right. <em>Code Girls: The Untold Story of the American Women Code Breakers Who Helped Win World War II</em> absolutely belongs in the Hall of Fame, and I wholeheartedly endorse its induction. </p><p>If you think the history of cryptology in World War II begins and ends at Bletchley Park and Alan Turing, this book will correct that assumption fast. Mundy pulls back the curtain on a parallel American effort. They ran it at scale, under extreme secrecy, and it was largely powered by women. These exceptional cryptanalysts performed the bulk of the operational code breaking that helped win the war. This isn&#8217;t just a recovery of forgotten history; it&#8217;s a recalibration of where the real work got done.</p><p>I&#8217;ve been a fan-boy to the WWII code breaking efforts at Bletchley Park for many years now. Alan Turing is a personal computer science hero of mine. I first heard about his Enigma-busting exploits against German codes in my favorite hacker novel of all time, 1999&#8217;s <em>Cryptonomicon</em>, written by the Cybersecurity Canon Lifetime Achievement author, Neal Stephenson.  Of course, the excellent 2014 movie <em>The Imitation Game</em> with Benedict Cumberbatch playing Turing is one of my favorites.</p><blockquote><p>Sometimes it&#8217;s the people no one imagines anything of who do the things that no one can imagine. - The Imitation Game</p></blockquote><p>It turns out that an entire group of other people that no one imagined anything of were doing similar work in the United States. I always knew that there were like-minded efforts going on in the Pacific Theater. I heard rumors of the Americans breaking various codes, like the team working for William Friedman that solved the Japanese Purple code, and the efforts of Joe Rochefort breaking the JN-25 code that led to victory at the Battle of Midway. But I never found any books that told that story. Well, now I have.  &#8220;Code Girls&#8221; by Liza Mundy is a treasure. </p><p>We learn from Mundy that cryptography is the art and science of code making, cryptanalysis is the discipline of code breaking, and cryptology captures both skill sets. Mundy describes Code Girls who operated primarily as cryptanalysts.</p><p>The remarkable characteristic about the &#8220;Code Girls&#8221; story is that despite the heroic efforts of Friedman and Rochefort, the day-to-day work of deciphering Japanese and other nations&#8217; codes during WWII was largely done by American women, civilians at first and then in collaboration with the newly formed WAVES (Women Accepted for Volunteer Emergency Service in The United States Naval Reserve) and the WAACs (Women&#8217;s Army Auxiliary Corps) that came into service in 1942. </p><p>While military and civilian men mostly got the credit, it was these formidable women who ran the show. And their efforts were so secretive, that many went to their grave without telling their loved ones what they did during the war. Family and friends thought that the &#8220;Code Girls&#8221; just did administrative work.</p><p>Mundy is able to tell the stories of some 20+ women, what they did with their  cryptanalyst efforts, and how they lived their lives. Let me just highlight six of the superstars.</p><h1>The Women</h1><h3>Agnes Meyer Driscoll:</h3><ul><li><p>One of the great cryptanalysts of all time.</p></li><li><p>Made major breakthroughs against Japanese naval cryptosystems in the 1920/30s. </p></li><li><p>Cursed like a sailor (Similar to Admiral Grace Hopper).</p></li><li><p>She was known for saying that any man-made code could be broken by a woman.</p><ul><li><p>Note: Sounds like a similar line from &#8220;The Return of the King&#8221; movie.</p><ul><li><p>Witch-king: &#8220;No man can kill me&#8221; &#8216;</p></li><li><p>&#201;owyn: &#8220;I am no man,&#8221; before striking him down.</p></li></ul></li></ul></li><li><p>Early work on Japanese naval codes was foundational to later team-based successes against JN-25.</p></li><li><p>Mentored and influenced a generation of Navy cryptanalysts, many of whom later received the credit.</p></li><li><p>Learned how the Japanese disguised their fleet code, using a method called &#8220;superencipherment,&#8221; that involves both a code and a cipher.</p></li><li><p>In 1937, she suffered a car crash that broke her leg badly, as well as both jaws. It took her a year to recover, and in some ways she never did. Many people felt her personality changed following her ordeal.</p></li><li><p>In 1940, the Navy took her off JN-25 and assigned her to an independent U.S. solution of Enigma, but her efforts lagged behind the more advanced British program.</p></li><li><p>After the war, the Navy revered her work yet marginalized her role and didn&#8217;t seem to know what to do with her. </p></li></ul><h3>Elizebeth Smith Friedman</h3><ul><li><p>Was part of the early Riverbank Laboratories effort that helped establish modern U.S. cryptanalysis.</p></li><li><p>Broke rumrunner codes during Prohibition for the U.S. Coast Guard  that resulted in  successful prosecutions. In court, she testified as an expert witness.</p></li><li><p>Married to William Friedman, the man who supervised the breaking of the Purple Code. Mundy makes a strong case that Elizabeth may have been the more naturally gifted early cryptanalyst and likely influenced William Friedman&#8217;s development.</p></li><li><p>Variously employed by the Justice and Treasury Departments, the Customs Bureau, the Coast Guard, and other agencies</p></li></ul><h3>Genevieve Grotjan </h3><ul><li><p>In September 1940, played the key role in identifying the pattern that enabled the U.S. to break the Japanese Purple code (Codename: Magic) that enabled sustained insight into Japanese diplomatic communications throughout much of the war.</p></li></ul><h3>Ann Caracristi</h3><ul><li><p>A problem-solving prodigy, intellectually ferocious, Annie worked twelve-hour shifts, day after day. </p></li><li><p>As a 23-year-old, became the head of an Army research unit.</p></li><li><p>One of only a few superstars who were asked to stay on after the war.</p></li><li><p>Matched wits against Japanese code makers, solving message addresses and enabling military intelligence to develop &#8220;order of battle&#8221; showing the location of Japanese troops. </p></li><li><p>Broke the Japanese Army address code system and excavated code groups revealing the place names of where Japanese Army units were located.</p></li><li><p>She had this mesmerizing thing she could do, flipping a pencil between her fingers and never dropping it (Like Boris Grishenko, played by Alan Cumming, in the James Bond movie <em>GoldenEye.</em> </p></li></ul><h3>Wilma Berryman, later Wilma Davis</h3><ul><li><p>Helped Ann Caracristi break the Japanese Army address code system.</p></li></ul><h3>Fran Steen, Later Suddeth Josephson</h3><ul><li><p>Helped break the inter-island cipher JN-25 code (Code name: Pretty Weather) that facilitated the assassination of General Yamamoto.</p></li></ul><h1>The Codes</h1><ul><li><p><strong>JN-20</strong>: A lower-level naval cipher system<strong>; </strong>regional/logistical communications. Cracking aided in the naval battle at Midway.</p></li><li><p><strong>JN-25</strong>: Primary an imperial Japanese Navy operational code; strategic, fleet-level, war-winning intelligence; Cracking led to assassination of General Yamamoto.</p></li><li><p><strong>2468</strong>: Water transport code. Cracking led to revealed supply chains and vulnerabilities.</p></li><li><p><strong>2345</strong>: Weapons logistics. Cracking exposed the Japanese Army&#8217;s logistics backbone.</p></li><li><p><strong>3366</strong>: &#8211; Aviation code: Cracking led to aircraft movement and support</p></li><li><p><strong>5678</strong>: High-volume, widely used Japanese Army communications system, Cracking helped pattern recognition to increase confidence.</p></li><li><p><strong>6666</strong>: Isolated or cut-off Japanese forces (late war). Cracking led to insight into degraded, fragmented command structures.</p></li><li><p><strong>6789</strong>: Promotions/transfers. Cracking led to an understanding of unit structure; specifically leadership changes</p></li><li><p><strong>7777</strong>: A theater-level Japanese Army communications system, associated with regions like the Southwest Pacific. Cracking led to understanding regional priorities, command relationships, and coordination between units in a specific battle space.</p></li></ul><p>I have two minor nitpicks about the book. The first is that Mundy tells a scattered story. If the reader wants to hear about the extraordinary accomplishments of, say, Ann Caracristi, there is not one place to look. You have to pick it up in fragments as you read the book. I found that to be frustrating. Second, Mundy devotes significant space to the personal and social lives of the Code Girls; their friendships, relationships, and life transitions alongside the war. That context will resonate with many readers and adds human depth to the story. For my purposes, though, I would have preferred more emphasis on the technical details and operational impact of their cryptanalytic work.</p><p>Those two minor complaints aside, I want to give a full throated endorsement for the Canon&#8217;s induction of this book&#8217;s into the Cybersecurity Canon Hall of Fame.  It&#8217;s not just as a compelling history, but as a corrective to the way we tell the story of cybersecurity&#8217;s origins. The lesson is straightforward: the foundation of modern cryptanalysis was not built by a handful of famous men. It was scaled, operationalized, and sustained by thousands of disciplined analysts, many of them women, working in obscurity. If your mental model of the field still centers on lone geniuses, this book forces an update. The Code Girls weren&#8217;t an exception to the rule. They were the rule.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Source</h1><p>Liza Mundy (Author), Erin Bennett (Narrator) 2017. <strong>Code Girls: The Untold Story of the American Women Code Breakers Who Helped Win World War II</strong> [2021 Canon Hall of Fame Book]. Goodreads, URL: <a href="https://www.goodreads.com/book/show/34184307-code-girls">https://www.goodreads.com/book/show/34184307-code-girls</a></p><ul><li><p>Canon Review URL: <a href="https://cybercanon.org/code-girls/">https://cybercanon.org/code-girls/</a></p></li></ul><h1>References</h1><p>Ashley Bennett, 2018. <strong>Cypher</strong> [Game Walkthrough Guide]. The Walkthrough King, URL: https://www.walkthroughking.com/text/cypher.aspx</p><p>Neal Stephenson, 1999. <strong>Cryptonomicon</strong> [2019 Canon Lifetime Achievement Author]. Goodreads, URL: https://www.goodreads.com/book/show/816.Cryptonomicon</p><ul><li><p>Canon URL: <a href="https://cybercanon.org/cryptonomicon/">https://cybercanon.org/cryptonomicon/</a></p></li></ul><p></p><p>Heather Antoinetti, 2026. <strong>&#8220;Code Girls&#8221; Example of Fragmentation during WWII is the same one stalling your AI strategy today.</strong> [Essay]. LinkedIn, URL: https://www.linkedin.com/posts/hantoinetti_womenshistorymonth-aiadoption-leadership-share-7444396839564382209-HMgq/</p><p></p><p>Heather Antoinetti, 2026. <strong>The Women Who Broke Codes and the System That Slowed Them Down</strong> [Essay]. The Ah-Ha Moment, URL: https://ah-ha.ai/the-ah-ha-moment/the-women-who-broke-codes-and-the-system-that-slowed-them-down</p><p>Morten Tyldum (Director), Graham Moore (Writer), Benedict Cumberbatch (Actor), Keira Knightley (Actor), and Matthew Goode (Actor), 2014. <strong>The Imitation Game</strong> [Movie]. Letterboxd, URL: https://letterboxd.com/film/the-imitation-game/</p><p></p><p>Benedict Cumberbatch (Actor), Keira Knightley (Actor), Michael Gathright (YouTube Content Producer), 2016. <strong>Imitation Game no one can imagine</strong> [Video]. YouTube, URL:</p><div id="youtube2-e7CpON1vulM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;e7CpON1vulM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/e7CpON1vulM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[The Cybersecurity Industry is Where the Risk Myths are Born]]></title><description><![CDATA[I&#8217;m working on my Cybersecurity Canon review of Tony Martin-Vegue&#8217;s 2026 book, From Heatmaps to Histograms.]]></description><link>https://diffuser.substack.com/p/the-cybersecurity-industry-is-where</link><guid isPermaLink="false">https://diffuser.substack.com/p/the-cybersecurity-industry-is-where</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Thu, 30 Apr 2026 20:34:32 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!V0bx!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc2838977-ba2c-4bcc-b61e-4ffc8e853d3a_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p>I&#8217;m working on my Cybersecurity Canon review of Tony Martin-Vegue&#8217;s 2026 book, <em>From Heatmaps to Histograms. </em>In the prologue, Tony says this:</p><blockquote><p>You won&#8217;t find the answers to cyber risk quantification inside the cybersecurity industry, not in the books, frameworks, or certifications. That&#8217;s where the myths are born: that quant is impossible, that you need mountains of perfect data, that it&#8217;s too complicated to be worth it.</p></blockquote><p>I&#8217;ve been trying to convey that exact sentiment for about five years now. When I&#8217;m writing and speaking to groups, I usually say this immediately after.</p><blockquote><p>We are wrong of course.</p></blockquote><p>Tony&#8217;s book is excellent. You should read it.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Source</h1><p>Tony Martin-Vegue, 2026. <strong>From Heatmaps to Histograms: A Practical Guide to Cyber Risk Quantification</strong> [Book]. Goodreads. URL <a href="https://www.goodreads.com/book/show/243058626-from-heatmaps-to-histograms">https://www.goodreads.com/book/show/243058626-from-heatmaps-to-histograms</a></p>]]></content:encoded></item><item><title><![CDATA[A Board Presentation on Cyber First Principles ]]></title><description><![CDATA[The Board's Role is to insist on Material Risk Reduction]]></description><link>https://diffuser.substack.com/p/a-board-presentation-on-cyber-first</link><guid isPermaLink="false">https://diffuser.substack.com/p/a-board-presentation-on-cyber-first</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 27 Apr 2026 12:00:48 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!pUyq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F196cbe31-d2df-4b8e-8b20-39c654271982_1536x1024.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<blockquote><p>Right now, boards are approving millions in cybersecurity spend every year without knowing if it actually reduces risk.</p></blockquote><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!pUyq!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F196cbe31-d2df-4b8e-8b20-39c654271982_1536x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!pUyq!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F196cbe31-d2df-4b8e-8b20-39c654271982_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!pUyq!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F196cbe31-d2df-4b8e-8b20-39c654271982_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!pUyq!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F196cbe31-d2df-4b8e-8b20-39c654271982_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!pUyq!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F196cbe31-d2df-4b8e-8b20-39c654271982_1536x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!pUyq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F196cbe31-d2df-4b8e-8b20-39c654271982_1536x1024.png" width="524" height="349.4532967032967" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/196cbe31-d2df-4b8e-8b20-39c654271982_1536x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:971,&quot;width&quot;:1456,&quot;resizeWidth&quot;:524,&quot;bytes&quot;:1939688,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/194176753?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F196cbe31-d2df-4b8e-8b20-39c654271982_1536x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!pUyq!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F196cbe31-d2df-4b8e-8b20-39c654271982_1536x1024.png 424w, https://substackcdn.com/image/fetch/$s_!pUyq!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F196cbe31-d2df-4b8e-8b20-39c654271982_1536x1024.png 848w, https://substackcdn.com/image/fetch/$s_!pUyq!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F196cbe31-d2df-4b8e-8b20-39c654271982_1536x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!pUyq!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F196cbe31-d2df-4b8e-8b20-39c654271982_1536x1024.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>I run a small consulting service called First Principles Consulting where I advise clients on cybersecurity strategies that buy down business risk. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cybersecurityfirstprinciples.com/&quot;,&quot;text&quot;:&quot;First Principles Consulting&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cybersecurityfirstprinciples.com/"><span>First Principles Consulting</span></a></p><p>Last week, I briefed the board of a large organization in terms of revenue. The board secretary asked me to talk about my book and how it applies to board oversight. </p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/4mI7QMU&quot;,&quot;text&quot;:&quot;First Principles Book&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/4mI7QMU"><span>First Principles Book</span></a></p><p>Further, she wanted me to give an overview of the Mythos platform and recommend how the board should think about this latest cybersecurity threat. I had 20 minutes. </p><p>Here is what I presented</p><h1>Let&#8217;s be a Bit Controversial</h1><p>Business leaders and board members let security pros like me get away with Fear Uncertainty and Doubt briefings for three decades. I call them FUD Briefings</p><p>I&#8217;ve been in the cybersecurity field for over 30 years. I&#8217;ve spent gazillions of dollars pursuing the accepted industry best practices of the day just like everybody else. But about 10 years ago, I had to admit that I really couldn&#8217;t tell my organizational leaders whether or not I had actually improved our defenses in some meaningful way; that what I was doing actually helped the business by improving its risk posture.</p><p>Oh, I collected the technical metrics by counting all the security things. I produced big and scary looking heat maps to justify additional funding for the next perceived threat. And The Heat Map slowly became the industry standard for conveying cyber risk to leadership.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!mpaC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea7dc9b-900f-41c6-ac7d-5683e40ebca4_953x472.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!mpaC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea7dc9b-900f-41c6-ac7d-5683e40ebca4_953x472.png 424w, https://substackcdn.com/image/fetch/$s_!mpaC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea7dc9b-900f-41c6-ac7d-5683e40ebca4_953x472.png 848w, https://substackcdn.com/image/fetch/$s_!mpaC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea7dc9b-900f-41c6-ac7d-5683e40ebca4_953x472.png 1272w, https://substackcdn.com/image/fetch/$s_!mpaC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea7dc9b-900f-41c6-ac7d-5683e40ebca4_953x472.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!mpaC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea7dc9b-900f-41c6-ac7d-5683e40ebca4_953x472.png" width="626" height="310.04407135362015" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/6ea7dc9b-900f-41c6-ac7d-5683e40ebca4_953x472.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:472,&quot;width&quot;:953,&quot;resizeWidth&quot;:626,&quot;bytes&quot;:45592,&quot;alt&quot;:null,&quot;title&quot;:&quot;risk-heat-map-slide4.png&quot;,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" title="risk-heat-map-slide4.png" srcset="https://substackcdn.com/image/fetch/$s_!mpaC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea7dc9b-900f-41c6-ac7d-5683e40ebca4_953x472.png 424w, https://substackcdn.com/image/fetch/$s_!mpaC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea7dc9b-900f-41c6-ac7d-5683e40ebca4_953x472.png 848w, https://substackcdn.com/image/fetch/$s_!mpaC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea7dc9b-900f-41c6-ac7d-5683e40ebca4_953x472.png 1272w, https://substackcdn.com/image/fetch/$s_!mpaC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F6ea7dc9b-900f-41c6-ac7d-5683e40ebca4_953x472.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>But, I mean, just look at that chart. Those are adjectives, feelings. They don&#8217;t represent facts about the business. And if the &#8220;critical&#8221; label in the top right corner wasn&#8217;t scary enough, we color coded it red just to make sure you didn&#8217;t miss the point. </p><p>How do you make resource decisions based on feelings? It&#8217;s like saying we should buy the next firewall because they&#8217;re fluffy. That doesn&#8217;t make any sense</p><p>When my peers and I get together behind closed doors, you know, at the bars, on the side streets near the conferences we were all attending, we unabashedly call the Heat Map the FUD briefing.</p><p>Looking back over my career, I&#8217;m a bit ashamed that I did that; that we all did that; that board members and senior staff let us get away with it. More importantly, I&#8217;m embarrassed that, back in the mid-1990s, just after we invented the CISO job, my peers and I somehow convinced business leaders and board members that cybersecurity risk was special; different than all the other risks that the business had to deal with.</p><p>We said that cyber risk was so distinctive that it required special handling compared to all the other business risks like strategic, financial, operational, etc; that cybersecurity risk was so technical and scary, that it couldn&#8217;t be thought of in the same business risk terms.</p><p>We were wrong, of course. </p><p>But we made business leaders believe it and, by the way, business leaders let us get away with it.</p><h1>A Reboot of Cybersecurity Strategy</h1><p>Don&#8217;t get me wrong. The cybersecurity people-process-technology triad did improve. We got better at what we were doing. We just never stopped to consider if we were going in the right direction in the first place. Most of us couldn&#8217;t even articulate a direction at all other than we need more stuff, and we absolutely couldn&#8217;t tie our efforts back to measuring business risk. </p><p>It occurred to me that what we needed was to wipe the table clean. Get rid of all of our assumptions about what works and what doesn&#8217;t. Eliminate all the frameworks and compliance standards and start from scratch. This, of course, got me to thinking about the idea of first principles. </p><p>I looked at the historical big thinkers, the philosophers, like Aristotle and Descartes. Descartes, perhaps the GOAT of first principle thinking with his</p><blockquote><p>Cogito Ergo Sum - I think, therefore I am. </p></blockquote><p>I looked at the mathematicians like Whitehead and Russell who reinvented the language of math from the ground up when they realized that you could get two absolutely correct answers to the same problem using the existing set of math rules. It took them 80 pages to prove that 1 + 1 = 2. And in my favorite footnote of all time, the authors said, and I quote,</p><blockquote><p>The above proposition is occasionally useful.</p></blockquote><p>Who knew that math nerds could be funny?</p><p>I even looked at  Elon Musk and how he solved the problem of reusable spacecraft. He didn&#8217;t look at what NASA did in the 1960s and took the next step. Instead, he threw everything out and started from scratch with first principles</p><p>These big thinkers, and many, many more, tackled gigantic complex problems by reducing them to first principles first, and then reasoning outward from there. </p><p>First Principles are atomic. They are the foundation for everything that follows. They are the absolute &#8220;What&#8221; regarding the thing we are trying to achieve reduced to their essential essence. Once you find them you can&#8217;t break them down any further</p><blockquote><p>Cogito Ergo Sum- I think therefore I am.</p></blockquote><p>Which made me wonder, what is the absolute cybersecurity first principle?</p><h1>The Absolute Cybersecurity First Principle</h1><p>I won&#8217;t bore you with the many iterations I went through, but three years ago, I published a book where I made the case for what I believe is the absolute cybersecurity first principle. Here&#8217;s it is:</p><div class="pullquote"><h5>Reduce the probability of a material cyber event within the next business cycle.</h5></div><p>That&#8217;s it.</p><p>It seems simple. It&#8217;s no longer than a Twitter line. But in practice, it&#8217;s quite complex. It&#8217;s actually three things.</p><ol><li><p>Reducing the probability.</p></li><li><p>Worry about material business impacts only.</p></li><li><p>Forecast within the current business cycle.</p></li></ol><p>In order to reduce the probability, you have to calculate the current probability. As an industry, we&#8217;re really quite bad at this. Most of us avoid the question because calculating it seems hard. There&#8217;s math involved, and probabilities. Because of that, we think we need five nines of precision and accuracy. Most of my peers think that this kind of quantitative analysis is impossible in the cybersecurity space.</p><p>So we punt and give business leaders qualitative analysis in the form of heatmaps. And by the way, there are reams of scientific papers that have proved, over and over again, that heat maps are just bad science when it comes to conveying risk to senior leaders (See the Hubbard and Seiersen 2018 Cybersecurity Canon Hall of Fame Book, <em>How to Measure Anything in Cybersecurity Risk </em>or my summary of it in the Resources section below<em>).</em></p><p>The thing is, you don&#8217;t need that kind of detail; that five nines of detail. You&#8217;re looking to make business decisions to buy down risk. What you need is good-enough precision and accuracy, ballpark precision and accuracy, in the same order-of-magnitude precision and accuracy, so that a business leader can make a decision about whether to buy the new firewall or not, whether to hire that new SOC analyst, or whether to implement that new access management policy.</p><p>Calculating that probability can be done and I talk about how to do it in my book. And this is what it might look like for this large company.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!bmRE!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8912913c-9cdc-42d1-b3c2-0a266c536176_1766x1210.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!bmRE!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8912913c-9cdc-42d1-b3c2-0a266c536176_1766x1210.png 424w, https://substackcdn.com/image/fetch/$s_!bmRE!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8912913c-9cdc-42d1-b3c2-0a266c536176_1766x1210.png 848w, https://substackcdn.com/image/fetch/$s_!bmRE!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8912913c-9cdc-42d1-b3c2-0a266c536176_1766x1210.png 1272w, https://substackcdn.com/image/fetch/$s_!bmRE!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8912913c-9cdc-42d1-b3c2-0a266c536176_1766x1210.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!bmRE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8912913c-9cdc-42d1-b3c2-0a266c536176_1766x1210.png" width="1456" height="998" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8912913c-9cdc-42d1-b3c2-0a266c536176_1766x1210.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:998,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:216017,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/194176753?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8912913c-9cdc-42d1-b3c2-0a266c536176_1766x1210.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!bmRE!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8912913c-9cdc-42d1-b3c2-0a266c536176_1766x1210.png 424w, https://substackcdn.com/image/fetch/$s_!bmRE!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8912913c-9cdc-42d1-b3c2-0a266c536176_1766x1210.png 848w, https://substackcdn.com/image/fetch/$s_!bmRE!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8912913c-9cdc-42d1-b3c2-0a266c536176_1766x1210.png 1272w, https://substackcdn.com/image/fetch/$s_!bmRE!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8912913c-9cdc-42d1-b3c2-0a266c536176_1766x1210.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>This is a first draft Loss Exceedance Curve that forecasts the probabilities of dollar loss thresholds over the next year. This is an outside in forecast, meaning, that it doesn&#8217;t take into consideration any of the generic company&#8217;s deployed defensive measures. This forecast only considers the general case. What is the probability of a material loss to any institution of the same size and vertical in terms of revenue. If we factored in their deployed infosec program, these numbers would most likely be two to three points lower.</p><p>For example, in this outside-in-analysis, the probability that this generic company might lose a million dollars in the next business cycle is 6%. The chances that it  will lose more than $100 million is just .65 percent. That brown dot represents the generic company&#8217;s material loss threshold. I made an assumption that any loss less than 2 Million would hurt but it wouldn&#8217;t be material to the business. But anything greater would be. The probability of that event is just 5.54 percent.</p><p>Here&#8217;s my point: wouldn&#8217;t you rather see a loss exceedance curve, built on concrete business data and explicit ranges of uncertainty, that estimates the probability of a material loss within the next year to the right order of magnitude, rather than qualitative Heat Maps and  their fluffy adjectives?</p><p>The bottom line is this: If we can&#8217;t estimate the probability of loss, then every cybersecurity investment is effectively a guess based on feelings and fear. We can do better than that and I believe boards can provide the guidance to get us there.</p><h3>First Principle Takeaway</h3><p>Thinking in terms of first principles reduces cybersecurity to its essence: What is the probability of a material cyber event in the next business cycle. This focuses the entire activity towards business goals. It gives senior leaders and board members a path to weigh cyber risk against all the other business risks and to evaluate if the spend is worth the investment. First principles turn cybersecurity from a cost center into a capital allocation problem. Once you define probability, materiality, and time, every dollar you spend can be evaluated against how much risk it actually removes.</p><p></p><h1>Mythos: Vulnerability Discovery and the Burglar Metaphor.</h1><p>Recently, Anthropic, one of the big AI companies, announced a new product, Mythos, and it&#8217;s restricted access program, Project Glasswing. Security professionals have been reacting to Mythos the way the world reacted to ChatGPT in 2022; stunned by what it can do and uncertain about what comes next.&#8221;</p><p>Mythos is Anthropic&#8217;s highly capable AI model designed for cybersecurity tasks, especially vulnerability discovery and exploit code development. Because of the potential danger, Project Glasswing is Anthropic&#8217;s program to only allow access to a small selection of vendors and infrastructure operators. Mythos isn&#8217;t available to the public. In order to understand the significance of this new development though, I like to use a metaphor to explain the difference between software vulnerabilities and exploit code.</p><p>Think about securing your house from intruders. Nobody&#8217;s house is burglar proof. You lock your doors and windows, you subscribe to a security monitoring company, and you have two big dogs that mostly sleep in the living room but you claim that they&#8217;re  your watchdogs. But, there are weaknesses.</p><p>You chose cheap locks, and sometimes, you forget to lock the windows when you go to bed. You put the dogs in the Kennel at night. Nothing bad has happened yet. You just know that there are certain vulnerabilities in your system.</p><p>The same is true for software. Developers sometimes write code that has inherent vulnerabilities built in. They either made mistakes when they were writing it or they didn&#8217;t follow the standard rules designed to prevent such things. Hackers, in contrast, write exploit code designed to leverage a specific software vulnerability.</p><p>In our house metaphor, a burglar walks up to the ground floor window in the middle of the night, notices that you forgot to lock the window, opens the window, and climbs into the house. The burglar has exploited the vulnerability. When hackers launch an exploit at a piece of software, they are looking to climb in a software window; to gain access to a system on the victim&#8217;s network. There is an entire portion of the cybersecurity industry dedicated to finding software vulnerabilities and getting them patched as quickly as possible so that hackers can&#8217;t do this.</p><h1>Why is Mythos Significant</h1><p>Before Mythos, the process of building reliable exploit code was extremely manual and expensive. Governments would pay anywhere from tens of thousands to over a million dollars for reliable exploit code, depending on the target (Source: Perlroth). It&#8217;s the reason that hackers only use exploit code in less than 20% of their attack campaigns (Source: 2025 Verizon DBIR). Most hackers can&#8217;t afford to pay for the exploit code development or don&#8217;t have the skill to build the exploit code themselves. Besides, there are far easier ways to gain access to a system then running expensive exploit code.</p><p>The reason that everybody is talking about mythos is because, among other things, it has greatly reduced the cost of developing exploit code. In the same way that large language models like ChatGPT, Claude, and Gemini are significant in the way those models can summarize large quantities of text relatively quickly, Mythos can scan software repositories, identify potential software vulnerabilities, and write exploit code that leverages those vulnerabilities in a fraction of the time our previous manual process required.</p><p>Restricting access to Mythos through Project Glasswing buys time, but not much. The underlying capability, scanning code for vulnerabilities and generating exploit code, already exists across competing AI systems. None of them have a purpose-built tool like Mythos yet. They will. And adversary nation-states like China and Russia almost certainly have this capability already. They're just not publishing press releases about it.</p><p>I have an old friend of mine who still works in the NSA. This past weekend, we met for breakfast with a bunch of old Army guys and Mythos was the conversation topic. We asked him if the NSA already had this capability. He just smiled and wouldn&#8217;t confirm one way or the other. He gave nothing away but I would bet $100 of my own money that the U.S. already has this capability and has for some time.</p><h1>The Mythos Impact Minus the FUD</h1><p>The impact is that, in the near future, the percentage of attack campaigns that use exploit code will start to go up; way past the 20% I quoted before, because the cost just dropped through the floor.</p><p>All of this sounds alarming, even FUD-Like, but in reality, the only thing that is significantly changing will be the volume of attack campaigns that use exploit code to compromise victims. It&#8217;s not a panic moment. It is a logical progression. Every infosec team of any size already runs some form of vulnerability management. The trick today is to scale those programs using the same technology; to discover new vulnerabilities quickly, and patch them before attackers can exploit them. The appropriate response is to focus on your own vulnerability management program to ensure that it can operate at greater speed and scale.</p><p>This generic company already has a process to identify and patch vulnerabilities. The question is whether those processes are fast enough in an environment where attackers may also be accelerating. This is where investments in automation, prioritization, and process efficiency become directly tied to reducing risk.</p><h1>Last Thoughts</h1><p>For the past 30 years, cybersecurity improved tactically but fallen short strategically. Security professionals, like me, made a bad assumption in the early days that cybersecurity risk was somehow technical and scary that it was different than all the other business risks. What still surprises me is that nobody called us on it sooner. In hindsight, they should have made us demonstrate how our efforts across the people-process-technology triad improved the risk posture of the business. Three decades later, we are all just now coming to the conclusion that we were wrong.</p><p>For the board, everything discussed in this essay reduces to one question: What is the probability of a material cyber event in the next year. Every cybersecurity dollar the board approves should demonstrably reduce the probability of a material loss within a defined time horizon. That&#8217;s first principle thinking.</p><p>New technologies like Mythos don't change the principle and don't require us to rebuild our programs from scratch. Mythos will make us to refocus our tactics. We will need to change our reaction velocity. If we&#8217;ve grounded our cybersecurity strategies in first principles though, they will hold. The adjustment is at the tactical level, operating at greater speeds, and ensuring our defenses keep pace with the evolving threat.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Resources</h1><p>C. David Hylender, Philippe Langlois, Alex Pinto, Suzanne Widup, 2025. <strong>Data Breach Investigations Report</strong> [Report]. Verizon Business, URL: https://www.verizon.com/business/resources/reports/2025-dbir-data-breach-investigations-report.pdf</p><p>Gadi Evron, Rich Mogull, Robert T. Lee, Jen Easterly, Bruce Schneier, Chris Inglis, Phil Venables, Heather Adkins, Rob Joyce, Sounil Yu, Jim Reavis, Katie Moussouris, John N. Stewart, Maxim Kovalsky, Dave Lewis, Joshua Saxe, John Yeoh, Ramy Houssaini, 2026. <strong>The &#8220;AI Vulnerability Storm&#8221;: Building a &#8220;Mythos-ready&#8221; Security Program</strong> [White paper]. Cloud Security Alliance Lab Space, URL: https://labs.cloudsecurityalliance.org/mythos-ciso/</p><p>Helen Patton<strong>, </strong>Rick Howard, Larry Pesce n.d. <strong>This Is How They Tell Me the World Ends</strong> [Book Review]. Cybersecurity Canon Project. URL https://cybercanon.org/this-is-how-they-tell-me-the-world-ends/</p><p>Nicole Perlroth, 2021. <strong>This Is How They Tell Me the World Ends: The Cyberweapons Arms Race</strong> [Book]. Goodreads. URL https://www.goodreads.com/book/show/49247043-this-is-how-they-tell-me-the-world-ends</p><p>Rick Howard, <strong>First Principles Consulting</strong> [Company Page]. Cybersecurity First Principles, URL: https://cybersecurityfirstprinciples.com/</p><p>Rick Howard, 2023. <strong>Cybersecurity First Principles: A Reboot of Strategy and Tactics</strong> [2026 Canon Hall of Fame Book]. Amazon, URL: https://amzn.to/4mI7QMU</p><p>Rick Howard, 2023. <strong>Research on Why the Heat Maps are Poor Vehicles for Conveying Risk</strong> [Book Appendix]. The CyberWire, URL: https://www.n2k.com/cybersecurityfirstprinciplesbook</p><p>Staff, 7 April 2026. <strong>Project Glasswing</strong> [Announcement]. Anthropic, URL: https://www.anthropic.com/project/glasswing</p><p>Douglas Hubbard, Richard Seiersen, 2016. <strong>How to Measure Anything in Cybersecurity Risk</strong> [2018 Cybersecurity Canon Hall of Fame  Book].  </p><ul><li><p>Canon Review: <a href="https://cybercanon.org/how-to-measure-anything-in-cybersecurity-risk/">https://cybercanon.org/how-to-measure-anything-in-cybersecurity-risk/</a></p></li><li><p>Goodreads: <a href="https://www.goodreads.com/book/show/26518108-how-to-measure-anything-in-cybersecurity-risk">https://www.goodreads.com/book/show/26518108-how-to-measure-anything-in-cybersecurity-risk</a></p></li><li><p>Canon Interview: </p></li></ul><div id="youtube2-2o_mAavdabg" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;2o_mAavdabg&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/2o_mAavdabg?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Wait and Hope:]]></title><description><![CDATA[Why You Should Finally Read The Count of Monte Cristo]]></description><link>https://diffuser.substack.com/p/wait-and-hope</link><guid isPermaLink="false">https://diffuser.substack.com/p/wait-and-hope</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 20 Apr 2026 12:03:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!azvB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46bccb7-b8d6-465c-aa30-3eba6c0ceed3_1024x1447.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!azvB!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46bccb7-b8d6-465c-aa30-3eba6c0ceed3_1024x1447.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!azvB!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46bccb7-b8d6-465c-aa30-3eba6c0ceed3_1024x1447.png 424w, https://substackcdn.com/image/fetch/$s_!azvB!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46bccb7-b8d6-465c-aa30-3eba6c0ceed3_1024x1447.png 848w, https://substackcdn.com/image/fetch/$s_!azvB!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46bccb7-b8d6-465c-aa30-3eba6c0ceed3_1024x1447.png 1272w, https://substackcdn.com/image/fetch/$s_!azvB!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46bccb7-b8d6-465c-aa30-3eba6c0ceed3_1024x1447.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!azvB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46bccb7-b8d6-465c-aa30-3eba6c0ceed3_1024x1447.png" width="520" height="734.8046875" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/b46bccb7-b8d6-465c-aa30-3eba6c0ceed3_1024x1447.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1447,&quot;width&quot;:1024,&quot;resizeWidth&quot;:520,&quot;bytes&quot;:3828706,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/194688511?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F472ab19b-61d3-4331-9ca8-16005a9fb865_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!azvB!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46bccb7-b8d6-465c-aa30-3eba6c0ceed3_1024x1447.png 424w, https://substackcdn.com/image/fetch/$s_!azvB!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46bccb7-b8d6-465c-aa30-3eba6c0ceed3_1024x1447.png 848w, https://substackcdn.com/image/fetch/$s_!azvB!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46bccb7-b8d6-465c-aa30-3eba6c0ceed3_1024x1447.png 1272w, https://substackcdn.com/image/fetch/$s_!azvB!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fb46bccb7-b8d6-465c-aa30-3eba6c0ceed3_1024x1447.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>If you have been putting off <em>The Count of Monte Cristo</em> because of its length, I am here to tell you that you are right to be scared and wrong to keep waiting.</p><p>Alexandre Dumas is an author I feel like I have always known about but have never read. His most popular novels (<em>The Three Musketeers</em>, <em>The Man in the Iron Mask</em>, and <em>The Count of Monte Cristo</em>) have well over 100 screen adaptations combined if you count silent films, TV movies, series, miniseries, and international productions. But I have never read any of the books. Over the New Years holiday, one our close family friends said that she was reading it and loving it, so I thought I would give it a try.</p><p>I&#8217;m glad that I did because it is an entertaining and complex soap-opera-revenge-story set in and around Italy and France just before and after the French defeated Napoleon at the Battle of Waterloo in 1815. But it is long; 60 hours of audio long. It took me three months to get through it. And there are a bazillion characters to keep track of. And as good as Dumas is, I had trouble keeping everybody straight.</p><p>The setup is relatively simple, but the execution of it is complex. A young Edmond Dant&#232;s is sabotaged by three colleagues and one magistrate over the jealousy of his fiancee, the envy of his promising naval career, indifference, and political self-preservation. His enemies frame him for a crime he didn't commit and send him to prison forever. While in prison, he meets an older-man-father-figure who teaches him various languages, math, philosophy, and the analytical framework that lets Dant&#232;s understand the conspiracy. Just before their get-away, the old man dies but not before he reveals the location of his secret treasure. Heartbroken, Edmond escapes anyway, recovers the treasure, and takes another 10 years planning his revenge. He shows up in Rome and in Italy as the Count of Monte Cristo, maybe the most wealthy person on the planet, and starts to pull the strings of his revenge plan on his four targets.</p><ul><li><p>The Count disgraces Fernand Mondego so badly that Mondego commits suicide.</p></li><li><p>He exposes G&#233;rard de Villefort&#8217;s hypocrisy to the world. The impact is that Villefort loses his family and goes insane.</p></li><li><p>He gives Gaspard Caderousse a chance to reform but Caderousse can&#8217;t stay on that path. He dies as a direct consequence of returning to crime.</p></li><li><p>He financially ruins Baron Danglars by preying on his greed. Danglars becomes a pauper but, at the end of the book and with a feeling of remorse, the Count spares his life.</p></li></ul><p>Dant&#232;s carries out most of his revenge, but when innocent people suffer, he recognizes he&#8217;s gone too far. He spares Danglars, abandons further vengeance, and turns toward mercy rather than trying to justify his role as divine justice.</p><p>And I will say, Dumas sticks the landing. All of those bazillion characters I was talking about have a satisfying arc. And the resolution to it all is hopeful. The Count abandons the role of avenging angel, acknowledges he is not God and cannot perfectly administer justice, and in the final pages, delivers his final philosophy: <em>wait and hope</em> (&#8220;attendre et esp&#233;rer).</p><p>But let me address the book&#8217;s length. Newspapers paid Dumas primarily through serialization contracts. Payment scaled with output volume, not literary minimalism. Expansive plots and large casts sustained serialization. The system rewarded length and continuity, so verbosity had economic upside. Dumas wasn&#8217;t counting words but he was absolutely operating in a system where more content = more money.</p><p>Dumas was one of the first &#8220;industrial-scale&#8221; novelists in history. He ran his writing career like a production company. He worked with collaborators, like Auguste Maquet, who would draft outlines, build historical scaffolding, and sometimes produce early versions of chapters.  Dumas would then rewrite heavily, add dialogue, pacing, and injected iconic flair that made these kinds of books popular. He essentially built a content pipeline, 150 years before Hollywood writers&#8217; rooms or modern media franchises.</p><p>He made enormous money but spent it faster than it was coming in. He built the extravagant Ch&#226;teau de Monte-Cristo outside Paris, hosted constant parties, funded friends, and lived big. He was in perpetual debt and eventually exiled himself to Belgium to avoid creditors. He orchestrated numerous affairs and begat several children. He was financially reckless, socially dominant, politically engaged, and personally chaotic. And that combination is exactly why his books feel so alive. To adapt Thoreau&#8217;s Walden,</p><blockquote><p>He lived deep and sucked out all the marrow of life.&#8221;</p></blockquote><p>And by the way, the man could write.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><div><hr></div><h1>Source</h1><p>Alexandre Dumas (Author), Robin Buss (Translator), Bill Homewood (Narrator), 1844. <strong>The Count of Monte Cristo</strong> [Book]. Narrated by Bill Homewood. Goodreads. URL <a href="https://www.goodreads.com/book/show/7126.The_Count_of_Monte_Cristo">https://www.goodreads.com/book/show/7126.The_Count_of_Monte_Cristo</a></p><h1>References</h1><p>Kevin Reynolds (Director), 2002. The Count of Monte Cristo [Movie]. Letterboxd, URL: <a href="https://letterboxd.com/film/the-count-of-monte-cristo-2002/">https://letterboxd.com/film/the-count-of-monte-cristo-2002/</a></p><p>KimMiE, 2025. The Count of Monte Cristo by Alexandre Dumas [Book Review]. Cannonball Read, URL: <a href="https://cannonballread.com/2025/04/the-count-of-monte-cristo-kimmie/">https://cannonballread.com/2025/04/the-count-of-monte-cristo-kimmie/</a></p><h1>Other Books by Alexandre Dumas</h1><p>Alexandre Dumas, 1844. <strong>The Three Musketeers</strong> [Book]. Goodreads, URL: <a href="https://www.goodreads.com/book/show/7190.The_Three_Musketeers">https://www.goodreads.com/book/show/7190.The_Three_Musketeers</a></p><p>Alexandre Dumas, 1847. <strong>The Man in the Iron Mask</strong> [Book]. Goodreads, URL: https://www.goodreads.com/book/show/54499.The_Man_in_the_Iron_Mask</p>]]></content:encoded></item><item><title><![CDATA[Who is Satoshi Nakamoto?]]></title><description><![CDATA[A Superforecasting Analysis by the New York Times]]></description><link>https://diffuser.substack.com/p/who-is-satoshi-nakamoto</link><guid isPermaLink="false">https://diffuser.substack.com/p/who-is-satoshi-nakamoto</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 13 Apr 2026 12:03:49 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!N7V_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041a16ce-e108-4925-a3cc-e726f4e22c45_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p>What if I told you the hunt for Satoshi Nakamoto is actually a masterclass in cyber risk forecasting?</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!N7V_!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041a16ce-e108-4925-a3cc-e726f4e22c45_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!N7V_!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041a16ce-e108-4925-a3cc-e726f4e22c45_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!N7V_!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041a16ce-e108-4925-a3cc-e726f4e22c45_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!N7V_!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041a16ce-e108-4925-a3cc-e726f4e22c45_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!N7V_!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041a16ce-e108-4925-a3cc-e726f4e22c45_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!N7V_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041a16ce-e108-4925-a3cc-e726f4e22c45_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/041a16ce-e108-4925-a3cc-e726f4e22c45_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3271885,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/193720169?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041a16ce-e108-4925-a3cc-e726f4e22c45_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!N7V_!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041a16ce-e108-4925-a3cc-e726f4e22c45_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!N7V_!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041a16ce-e108-4925-a3cc-e726f4e22c45_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!N7V_!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041a16ce-e108-4925-a3cc-e726f4e22c45_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!N7V_!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F041a16ce-e108-4925-a3cc-e726f4e22c45_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p></p><p>The week, two New York Times journalists claimed to have solved one of the greatest internet mysteries of the past 20 years. They argue that the man behind the pseudonym of Satoshi Nakamoto, the creator of Bitcoin, is none other than Adam Back, a British cryptographer, inventor of Hashcash, CEO of Blockstream, and early cypherpunk enthusiast. Internet sleuths have had Mr. Back on a list of possibles for years, but with the NYTs analysis, he just became the frontrunner. One of the journalists, John Carreyrou, claims that he is between 99.5% and 100% confident about his forecast. </p><p>The reason this story caught my eye is that, to reach their conclusion, the journalists followed a loose Bayesian methodology, applied some basic Superforecasting techniques, and liberally leveraged a collection of Fermi Estimates to eliminate a field of over 1,000 suspects down to one name. And if this sounds familiar, it should. That collection of methods is identical to the methods I advocate for calculating cyber risk in my book, <em>Cybersecurity First Principles.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/4mI7QMU&quot;,&quot;text&quot;:&quot;Book&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/4mI7QMU"><span>Book</span></a></p><p>I think this Bitcoin case study is an illustrative example of how to apply that reasoning to another field.</p><p></p><h1>Satoshi Nakamoto History</h1><p>For those living under a rock for the past 20 years, Satoshi is the author pseudonym behind the famous 2008 paper,  <em>Bitcoin: A Peer-to-Peer Electronic Cash System</em>, the paper that jump-started the entire cryptocurrency phenomenon. As Carreyrou put it, Satoshi</p><blockquote><p>&#8230; revolutionized finance, spawned a $2.4 trillion industry and amassed one of the world&#8217;s biggest fortunes in one stroke of staggering genius. </p></blockquote><p>But no one identified the real identity behind the pseudonym for two decades.</p><p></p><h1>The Main Method: Stylometry</h1><p>One technique that Carreyrou and his colleague, Dylan Freedman, used to narrow their search is called stylometry. Stylometry is the quantitative analysis of writing style to identify or compare authors. It treats writing as data, not prose, and assumes that every writer has unconscious writing patterns that investigators can use like a fingerprint. They look for things like:</p><ul><li><p>frequency of common words (&#8220;the,&#8221; &#8220;and,&#8221; &#8220;of&#8221;)</p></li><li><p>sentence length and structure</p></li><li><p>punctuation habits</p></li><li><p>spelling preferences (e.g., &#8220;color&#8221; vs &#8220;colour&#8221;)</p></li><li><p>function-word usage (the most important signal)</p></li></ul><p>The technique started back in the 1850s but didn&#8217;t gain mathematical rigor until the 1960s. Frederick Mosteller and David L. Wallace published <em>Inference in an Authorship Problem </em>where they applied Bayesian statistics to discovering authorship of several essays in <em>The Federalist Papers</em>. Researchers argued over Federalist Nos. 49&#8211;58 and Nos. 62&#8211;63 as to whether Alexander Hamilton or James Madison wrote them. After their analysis, Mosteller and Wallace claimed that all of them were most likely written by Madison. Because of this work, historians now attribute authorship as follows:</p><ul><li><p>Alexander Hamilton: 51 essays</p></li><li><p>James Madison: 29 essays</p></li><li><p>John Jay: 5 essays</p></li></ul><p>The bottom line is that stylometry measures those patterns statistically and compares them across texts.</p><p>Carreyrou and Freedman hired a Stylometry expert to go through reams of published papers, email, and chat room logs, recently released during discovery in a lawsuit that identified another individual as Satoshi Nakamoto. The expert did the analysis twice, but each time he said the evidence was inconclusive about naming Adam Back. Back&#8217;s writing style was too similar to other suspects.</p><h1>Fermi Estimates to the Rescue</h1><p>Carreyrou went back to the drawing board and took a deep dive into the material again. If he made some assumptions, could he reduce the suspect pool down to one man? </p><p>This is a textbook example of Fermi estimates. Take a large and narly complex problem, make some back-of-the-envelope estimates, and reduce the problem space until you find a ballpark answer. Carreyrou compiled a list of 42 pieces of evidence, call them connection quirks, like observations on calendar timelines and writing tics, that he applied to the suspect list. He talks about each in his article but I have summarized them here:</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://docs.google.com/document/d/1E02rgDkP7-VuTkgoLq26vbs9VkhrGulLFz9-lm1REOI/edit?tab=t.0#heading=h.q3tjfl1vsi12&quot;,&quot;text&quot;:&quot;42 Pieces of Evidence&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://docs.google.com/document/d/1E02rgDkP7-VuTkgoLq26vbs9VkhrGulLFz9-lm1REOI/edit?tab=t.0#heading=h.q3tjfl1vsi12"><span>42 Pieces of Evidence</span></a></p><p>Of the 42, perhaps eight of them are strong signal indicators while the others are weaker. Over 15 of them are mostly noise. Here are the strongest indicators: </p><ul><li><p>20: Awareness of Hashcash and b-money</p></li><li><p>22: Timeline</p></li><li><p>24: Hacked email</p></li><li><p>31: Writing Tics - sociolinguistic variation</p></li><li><p>32: &#8220;Web Money&#8221; and &#8220;proof-of-work&#8221;</p></li><li><p>33: &#8220;partial pre-image&#8221;</p></li><li><p>34: &#8220;burning the money&#8221;</p></li><li><p>35: Assumption List</p></li></ul><p>In his article, Carreyrou talks about reducing the suspect list each time he applied one of those criteria. They started with over a thousand suspects. </p><ul><li><p>He reduced the pool to just over 600 by eliminating  candidates who never discussed digital money. </p></li><li><p>He reduced the list to 521 by correlating use of synonym-less words shared with Satoshi. </p></li><li><p>He reduced the list to 325 by comparing Satoshi&#8217;s grammatical hyphenation errors. </p></li><li><p>He narrowed the list further to 114 by grouping posters who sometimes confused &#8220;it&#8217;s&#8221; with &#8220;its&#8221; or vice versa. </p></li><li><p>He reduced the list to 56 by screening for those who finished some sentences with &#8220;also&#8221; like Satoshi. </p></li><li><p>He shrank the list down to 20 by selecting posters who wrote &#8220;bug fix&#8221; as two words and &#8220;halfway&#8221; and &#8220;downside&#8221; as one word. </p></li><li><p>He got the list down to eight by eliminating posters who, unlike Satoshi, correctly hyphenated the compound adjectives &#8220;noun-based&#8221; and &#8220;file-sharing&#8221; but did not hyphenate the compound noun &#8220;double spending.&#8221; </p></li><li><p>Finally, when he compared the remaining eight suspects who alternated between using &#8220;e-mail&#8221; and &#8220;email,&#8221; &#8220;e-cash&#8221; and &#8220;electronic cash,&#8221; &#8220;cheque&#8221; and &#8220;check&#8221; and the British and American forms of the word &#8220;optimize&#8221; like Satoshi did, only one name popped out as matching all of that criteria: Adam Back.</p></li></ul><h1>Not a Slam Dunk</h1><p>Clearly this isn&#8217;t as rigorous as a formal Stylometry assessment like Mosteller and Wallace&#8217;s. Carreyrou&#8217;s claim that he is 99.9% confident with the answer is suspect. It&#8217;s extremely high and isn&#8217;t represented as a range.</p><p>My own Superforecasting range is relatively lower. On the skeptical side, I weigh the stylometry inconclusiveness and Back&#8217;s direct correspondence with Satoshi more heavily. On the optimistic side, I weigh the British language clues, the Hashcash/cypherpunk lineage, and Carreyrou&#8217;s Fermi estimates more heavily. </p><p>In either case, Adam Back is the clear front-runner.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!CTGk!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a886b5f-d0d2-42e4-97ac-df1ea56be2c3_1680x854.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!CTGk!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a886b5f-d0d2-42e4-97ac-df1ea56be2c3_1680x854.png 424w, https://substackcdn.com/image/fetch/$s_!CTGk!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a886b5f-d0d2-42e4-97ac-df1ea56be2c3_1680x854.png 848w, https://substackcdn.com/image/fetch/$s_!CTGk!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a886b5f-d0d2-42e4-97ac-df1ea56be2c3_1680x854.png 1272w, https://substackcdn.com/image/fetch/$s_!CTGk!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a886b5f-d0d2-42e4-97ac-df1ea56be2c3_1680x854.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!CTGk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a886b5f-d0d2-42e4-97ac-df1ea56be2c3_1680x854.png" width="1456" height="740" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8a886b5f-d0d2-42e4-97ac-df1ea56be2c3_1680x854.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:740,&quot;width&quot;:1456,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:102966,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/193720169?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a886b5f-d0d2-42e4-97ac-df1ea56be2c3_1680x854.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!CTGk!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a886b5f-d0d2-42e4-97ac-df1ea56be2c3_1680x854.png 424w, https://substackcdn.com/image/fetch/$s_!CTGk!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a886b5f-d0d2-42e4-97ac-df1ea56be2c3_1680x854.png 848w, https://substackcdn.com/image/fetch/$s_!CTGk!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a886b5f-d0d2-42e4-97ac-df1ea56be2c3_1680x854.png 1272w, https://substackcdn.com/image/fetch/$s_!CTGk!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8a886b5f-d0d2-42e4-97ac-df1ea56be2c3_1680x854.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>If you put a gun to my head and made me bet which person is the most likely suspect behind the Satoshi Nakamoto alias, I would put my money on Adam Back.</p><h1>Take Away</h1><p>If you follow internet lore, the hunt for Satoshi Nakamoto is irresistible. Who wouldn&#8217;t want to uncover the man behind Bitcoin?</p><p>But the larger point for me is how John Carreyrou applied a disciplined way of thinking to produce a high-confidence estimate. He used Superforecasting techniques, a little bit of Bayesian reasoning, and Fermi estimation to reduce massive uncertainty into a tractable forecasting problem. That&#8217;s the same playbook we should be using in cybersecurity. We rarely get perfect data. We rarely get certainty. But we can systematically make good-enough cybersecurity forecasts, using these same procedures, that are in the right order of magnitude so that we can make resource decisions. This case study is about Bitcoin, but it&#8217;s also about how to think clearly when there is no data.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Source</h1><p>John Carreyrou With Dylan Freedman, 2026. My Quest to Solve Bitcoin&#8217;s Great Mystery [Analysis]. The New York Times, URL: https://www.nytimes.com/2026/04/08/business/bitcoin-satoshi-nakamoto-identity-adam-back.html</p><p></p><h1>References</h1><p>Alexander Hamilton, John Jay, James Madison, 1788. <strong>The Federalist Papers</strong> [Analysis]. Project Gutenberg. URL <a href="https://www.gutenberg.org/cache/epub/18/pg18-images.html">https://www.gutenberg.org/cache/epub/18/pg18-images.html</a></p><p>Cullen Hoback (Writer, Director), 2024. Money Electric: The Bitcoin Mystery [Documentary]. HBO - IMDb, URL: https://www.imdb.com/title/tt33600145/?ref_=vp_close</p><p>Frederick Mosteller, David L. Wallace, 1963. Inference in an Authorship Problem [Journal]. Journal of the American Statistical Association, URL: https://ptrckprry.com/course/ssd/reading/Most63.pdf</p><p>John Carreyrou, 2026. Who Is Satoshi Nakamoto, the Creator of Bitcoin? This Investigation May Have the Answer [Podcast]. The New York Times, URL: https://www.nytimes.com/2026/04/09/podcasts/the-daily/satoshi-nakamoto-bitcoin-creator.html</p><p>John Carreyrou, Natalie Kitroeff, 2026. Who Is Satoshi Nakamoto? [Podcast Transcript]. The New York Times, URL: https://www.nytimes.com/2026/04/09/podcasts/the-daily/satoshi-nakamoto-bitcoin-creator.html</p><p>Kevin Roose, Casey Newton, 2024. A Flood of A.I. Slop + Searching for Satoshi + the Hot Mess Express Returns [Podcast]. Podcast Addict, URL: https://podcastaddict.com/hard-fork/episode/184042839</p><p>Nathaniel Popper, 2015. Decoding the Enigma of Satoshi Nakamoto and the Birth of Bitcoin [Analysis]. The New York Times, URL: https://www.nytimes.com/2015/05/17/business/decoding-the-enigma-of-satoshi-nakamoto-and-the-birth-of-bitcoin.html</p><p>Philip Tetlock, Dan Gardner, 2015. Superforecasting: The Art and Science of Prediction [2023 Canon Hall of Fame Book].  Cybersecurity Canon Project. URL: https://cybercanon.org/superforecasting-the-art-and-science-of-prediction/</p><p>Rick Howard, Andy Greenberg, 2022. Andy Greenberg Interview: Tracers in the Dark. [Podcast]. The CyberWire, URL: https://thecyberwire.com/podcasts/cso-perspectives/95/transcript</p><p>Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [2026 Canon Hall of Fame Book]. Cybersecurity Canon Project, URL: https://cybercanon.org/cybersecurity-first-principles-a-reboot-of-strategy-and-tactics/</p><p>Rick Howard and Brandon Karpf, 2026. First Principles Risk Forecasting Workshop [Online Workshop]. Learning First Principles, URL: https://learnfirstprinciples.com/</p><p>Rick Howard (Editor), 2026. Satoshi Evidence  from Carreyrou NYT Article [Summary]. Google Docs, URL: https://docs.google.com/document/d/1E02rgDkP7-VuTkgoLq26vbs9VkhrGulLFz9-lm1REOI/edit?tab=t.0#heading=h.q3tjfl1vsi12</p><p>Satoshi Nakamoto, 2008. <strong>Bitcoin: A Peer-to-Peer Electronic Cash System</strong> [Historic and Important Paper]. Bitcoin. URL <a href="https://bitcoin.org/bitcoin.pdf">https://bitcoin.org/bitcoin.pdf</a></p><p>Sharon McGrayne, 2011. The Theory That Would Not Die: How Bayes&#8217; Rule Cracked the Enigma Code, Hunted Down Russian Submarines, and Emerged Triumphant from Two Centuries of Controversy [2024 Canon Niche Nominated]. Cybersecurity Canon Project, URL: https://cybercanon.org/the-theory-that-would-not-die-how-bayes-rule-cracked-the-enigma-code-hunted-down-russian-submarines-and-emerged-triumphant-from-two-centuries-of-controversy/</p><p>Staff, NA. cryptoanarchy.wiki - Cypherpunks Mailing List Archive [Wiki]. cryptoanarchy.wiki, URL: https://mailing-list-archive.cryptoanarchy.wiki/</p><p>Thomas Bayes, 1763. An Essay towards solving a Problem in the Doctrine of Chances [journal]. Philosophical Transactions of the Royal Society of London, URL: https://royalsocietypublishing.org/doi/epdf/10.1098/rstl.1763.0053</p><p>Will Stephenson, 2025. The Mysterious Mr. Nakamoto [Book Review]. The New York Times, URL: https://www.nytimes.com/2025/03/29/books/review/benjamin-wallace-the-mysterious-mr-nakamoto.html</p><p>Natalie Kitroeff, John Carreyrou, Adam Back, 2026. Unmasking the Creator of Bitcoin [Video]. New York Times Podcasts - YouTube, URL:</p><div id="youtube2-7RlaC9ZJNtA" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;7RlaC9ZJNtA&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/7RlaC9ZJNtA?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Barely Sociable, 2020. Bitcoin - Unmasking Satoshi Nakamoto [Video]. YouTube, URL:</p><div id="youtube2-XfcvX0P1b5g" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;XfcvX0P1b5g&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/XfcvX0P1b5g?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><h1></h1><p></p>]]></content:encoded></item><item><title><![CDATA[The AI Future Won’t Look Like The Terminator]]></title><description><![CDATA[It Will Look Like The Daemon]]></description><link>https://diffuser.substack.com/p/the-ai-future-wont-look-like-the</link><guid isPermaLink="false">https://diffuser.substack.com/p/the-ai-future-wont-look-like-the</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 06 Apr 2026 12:03:04 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2Iu4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ddd5cf-b931-4dd4-a8bd-9ead65d7daae_826x1240.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2Iu4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ddd5cf-b931-4dd4-a8bd-9ead65d7daae_826x1240.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2Iu4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ddd5cf-b931-4dd4-a8bd-9ead65d7daae_826x1240.png 424w, https://substackcdn.com/image/fetch/$s_!2Iu4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ddd5cf-b931-4dd4-a8bd-9ead65d7daae_826x1240.png 848w, https://substackcdn.com/image/fetch/$s_!2Iu4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ddd5cf-b931-4dd4-a8bd-9ead65d7daae_826x1240.png 1272w, https://substackcdn.com/image/fetch/$s_!2Iu4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ddd5cf-b931-4dd4-a8bd-9ead65d7daae_826x1240.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2Iu4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ddd5cf-b931-4dd4-a8bd-9ead65d7daae_826x1240.png" width="426" height="639.5157384987893" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c3ddd5cf-b931-4dd4-a8bd-9ead65d7daae_826x1240.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1240,&quot;width&quot;:826,&quot;resizeWidth&quot;:426,&quot;bytes&quot;:2487414,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/193133722?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ddd5cf-b931-4dd4-a8bd-9ead65d7daae_826x1240.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2Iu4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ddd5cf-b931-4dd4-a8bd-9ead65d7daae_826x1240.png 424w, https://substackcdn.com/image/fetch/$s_!2Iu4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ddd5cf-b931-4dd4-a8bd-9ead65d7daae_826x1240.png 848w, https://substackcdn.com/image/fetch/$s_!2Iu4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ddd5cf-b931-4dd4-a8bd-9ead65d7daae_826x1240.png 1272w, https://substackcdn.com/image/fetch/$s_!2Iu4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc3ddd5cf-b931-4dd4-a8bd-9ead65d7daae_826x1240.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>My generation worries about self-aware AI, like the Terminator from the movies, but the real threat doesn&#8217;t need consciousness at all. </p><p>I&#8217;ve been thinking about this in conjunction with one of my favorite novels: <em>Daemon </em>by Daniel Suarez. He and his wife self-published it back in 2006. First, it&#8217;s a ripping near-future techno-thriller that should have been made into a movie by now. Come on Netflix, this is the perfect two-season story for a network like yours. The book is a Cybersecurity Canon Niche Book and I wrote the review back in 2015. But as modern AI systems get more and more impressive, I&#8217;ve been in awe about how closely the author, Daniel Suarez, described where we are today some two decades ago.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cybercanon.org/daemon-and-freedom/&quot;,&quot;text&quot;:&quot;Daemon Canon Book Review&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cybercanon.org/daemon-and-freedom/"><span>Daemon Canon Book Review</span></a></p><h1>AGI - The Singularity - The Terminator</h1><p>The main bad guy is a post-AGI piece of software called The Daemon; named after those little Unix daemons that pop up, perform a task, and then disappear.</p><p>AGI stands for Artificial General Intelligence. It&#8217;s an AI research milestone where AI systems become better than all humans at all tasks; not just some humans and some tasks, but all of them. </p><p>When Daniel Suarez wrote it, and even when I read it a decade later, most people had never heard of AGI. The AI research community had been discussing the concept for years. Ben Goertzel&#8217;s 2006 book <em>Artificial General Intelligence</em> helped formalize the term. But for the general public, &#8220;AI&#8221; still meant something closer to the 1984 <em>Terminator</em> movie, where an AI system  suddenly becomes self-aware and decides to wipe out humanity.</p><p>I want to distinguish the term &#8220;AGI&#8221; from from the phrase &#8220;The Singularity&#8221; which happens later on the AI research milestone timeline. Ray Kurzweil popularized the concept in his 2005 book <em>The Singularity Is Near</em>. It&#8217;s the milestone when AGI systems have been recursively self improving themselves so fast that humans can&#8217;t comprehend or control. </p><h1>The Book&#8217;s Story</h1><p>That&#8217;s where Suarez sets the story<em>. </em>Matthew Sobol is a wealthy owner of a &#8220;World of Warcraft (WOW)&#8221; type of video game called <em>The Citadel</em>. In the real world, back in 2006, WOW  dominated the MMO (Massively Multiplayer Online) market with as many as 7 million subscribers. In the book, The Citadel is similar.</p><p>Sobol is a systems thinker but he sees existing institutions (corporate, legal, economic) as corrupt, fragile, and misaligned. He builds an alternative system, the Daemon, first using the Citadel as an AGI prototype, but eventually moving the prototype out into the real world to compete with and replace existing corrupt structures. </p><p>The Daemon uses coercion, violence, and manipulation to subordinate individuals to system-level outcomes. It embeds itself across global networks. It recruits people and systems, manipulates financial systems, and orchestrates real-world events through automated triggers. It operates like a distributed control system by leveraging surveillance, gaming mechanics, and incentives to build a decentralized organization that challenges governments and corporations. As law enforcement and security experts scramble to understand the threat, they discover the system is not just malicious. It&#8217;s adaptive, resilient, and guided by a coherent ideology.</p><p>All of this kicks off after Sobol dies at the beginning of the book. When Sobol finds out that he is dying from terminal brain cancer, he uses that time to design, test, and deploy the Daemon. The reader experiences what may be considered to be a post-apocalyptic, good-guy-vs-bad-guy story. But, even with all of the violence and damage to institutions worldwide, Suarez implies that there will be benefits too:</p><ul><li><p><strong>Reduced corporate and institutional corruption</strong>: The Daemon bypasses traditional power structures (banks, corporations, governments) and enforces transparent, rule-based interactions.</p></li><li><p><strong>Efficient resource allocation</strong>: Labor is matched to problems in near real-time.</p></li><li><p><strong>Alternative economic system</strong>:  Think cryptocurrencies before it became a thing. The Daemon builds a parallel economy that operates outside state control.</p></li><li><p><strong>Individual Empowerment</strong>: Skills and competence matter more than credentials.</p></li><li><p><strong>Local Community Restoration</strong>: Encourages localized production and self-sufficiency.</p></li><li><p><strong>Security through automation:</strong> The Daemon enforces rules consistently. The system deters crime through predictable, automated consequences.</p></li><li><p><strong>Incentives Alignment</strong>: Participants are incentivized to cooperate, contribute and follow system rules.</p></li></ul><p>But every &#8220;benefit&#8221; comes with a tradeoff:</p><ul><li><p>Coercion replaces consent.</p></li><li><p>Algorithmic control replaces human judgment.</p></li><li><p>Violence is used to enforce compliance.</p></li></ul><p>The bottom line is that a system that fixes real problems can still be dangerous if it removes human agency.</p><h1>Forecasting the AGI Timeline</h1><p>The Daemon isn&#8217;t the Terminator. It&#8217;s not self-aware. In fact, Suarez said he intentionally tried to tell a story that wasn&#8217;t Terminator-like. The Daemon operates autonomously and irreversibly on its own following the goals set by Sobol; just like giving Claude Work a goal to solve some problem today, but at a global scale.</p><p>I&#8217;ve been vibe coding with Chat GPT to write simple helper apps for about six months. And I&#8217;ve just recently dipped my toe into Claude Code. Because of that experience, and my general observation regarding the rapid improvement of AI systems in general, I&#8217;m starting to think the claims about imminent Artificial General Intelligence (AGI) may be justified.  All the AI companies&#8217; marketing teams think the industry might reach that milestone before 2030. Until just recently, I&#8217;ve been skeptical of that marketing hype. Still, it is possible. Putting my Superforecaster hat on, my first cut at estimating the probability of reaching the AGI research milestone is this:</p><ul><li><p>~20% chance by 2030</p></li><li><p>~50% chance by 2040</p></li><li><p>~70%+ by 2050</p></li></ul><p>Now, that&#8217;s a giant SWAG (Swinging-Wild-Ass-Guess) but I have more confidence in that forecast than I do the AI marketing teams&#8217; forecast.</p><p>Once we reach the AGI milestone though, whenever that happens, there will be a Post-AGI ramp where systems start improving themselves and capability begins to exceed human level expertise and control. At some point, we will reach the singularity. I have this nagging feeling though that because of the AGI system&#8217;s property of exponential improvement, the Post-AGI ramp might be very short. This is the setting of Suarez&#8217;s book. </p><h1>Take Away</h1><p>The novel explores how software can enforce rules, coordinate behavior, and outmaneuver traditional institutions. At its core, <em>Daemon</em> argues that autonomous code, once unleashed at scale, can become a governing force that blurs the line between tool and actor in modern society. At first glance, the reader might think this is one bad way it could go in a Post-AGI world. But in Suarez&#8217;s sequel, <em>Freedom</em>, he implies that this new way might be a better way and the only way to get there is to reboot society with violence and automation. The jury is out on that premise. Only you can be the judge.</p><p>Still, the book is a lot of fun and on that criteria alone, it&#8217;s worth the read. But it&#8217;s also one of those books that you think about long after you&#8217;ve read it. I&#8217;ve been doing it for over a decade and I&#8217;m still seeing things I didn&#8217;t notice when I first read it.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Source</h1><p>Daniel Suarez, 2006. <strong>Daemon</strong> [2015 Canon Niche Nominated Book]. Goodreads, URL: https://www.goodreads.com/book/show/6665847-daemon</p><h1>References</h1><p>Ben Goertzel, 2006. <strong>Artificial General Intelligence</strong> [Book]. Goodreads, URL: https://www.goodreads.com/book/show/1651355.Artificial_General_Intelligence</p><p>Brandon Karpf, Rick Howard, 2026. <strong>First Principles Risk Forecasting: The missing implementation chapter for quantitative risk forecasting</strong> [Workshop Tools] URL: https://learnfirstprinciples.com/</p><p>Daniel Suarez, 2010. <strong>Freedom&#8482; (Daemon, #2)</strong> [2015 Canon Niche Nominated Book]. Goodreads, URL: https://www.goodreads.com/book/show/8488830-freedom</p><p>James Cameron (Director), Linda Hamilton (Actor), Arnold Schwarzenegger (Actor), Michael Biehn (Actor), 1984. <strong>The Terminator</strong> [Movie]. Letterboxd, URL: https://letterboxd.com/film/the-terminator/</p><p>Matteo Wong and Lila Shroff, 2026. <strong>Silicon Valley Is in a Frenzy Over Bots That Build Themselves</strong> [Analysis]. The Atlantic, URL: https://www.theatlantic.com/technology/2026/04/ai-industry-self-improving-bots/686686/</p><p>Ray Kurzweil, 2005. <strong>The Singularity is Near: When Humans Transcend Biology</strong> [Book]. Goodreads, URL: https://www.goodreads.com/book/show/83518.The_Singularity_is_Near</p><p>Rick Howard, 2015. <strong>Daemon and Freedom</strong> [2015 Canon Niche Nominated Book Review]. CyberCanon, URL: https://cybercanon.org/daemon-and-freedom/</p><p>Rick Howard, 2025. Vibe Coding a Bayesian Thought Experiment [Explainer]. Rick&#8217;s First Principles Newsletter. URL https://diffuser.substack.com/p/vibe-coding-a-bayesian-thought-experiment </p><p>Thomas Bayes, 1763. <strong>An Essay towards solving a Problem in the Doctrine of Chances</strong> [Journal]. Philosophical Transactions of the Royal Society of London, URL: https://royalsocietypublishing.org/doi/epdf/10.1098/rstl.1763.0053</p><p>Tyler DFC, 2010. <strong>Don&#8217;t Be A Cog in the Wheel</strong> [Book Review]. Pajiba, URL: https://www.pajiba.com/book_reviews/book-review-daemon-by-daniel-suarez.php</p><p>Zoey Yang, 2024. <strong>Daemon: A Tech Thriller That Deserves to Hit the Screen(Score: 4.1/5)</strong> [Book Review]. Medium, URL: https://medium.com/@PurrCoderHickory/daemon-a-tech-thriller-that-deserves-to-hit-the-screen-4dabdb78d4b3</p><p>Daniel Suarez, 2009. <strong>Daniel Suarez, author of Daemon</strong> [Video]. YouTube, URL:</p><div id="youtube2-sUEGzjnGsiA" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;sUEGzjnGsiA&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/sUEGzjnGsiA?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p></p><p>Gregory Warner, 2025. The Last Invention, EP 1: Ready or Not  [Podcast]. Longview - YouTube. URL </p><div id="youtube2-7781eYoHmFo" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;7781eYoHmFo&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/7781eYoHmFo?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div>]]></content:encoded></item><item><title><![CDATA[Thoughts on The Cuckoo's Egg]]></title><description><![CDATA[Is this classic book still relevant today?]]></description><link>https://diffuser.substack.com/p/thoughts-on-the-cuckoos-egg</link><guid isPermaLink="false">https://diffuser.substack.com/p/thoughts-on-the-cuckoos-egg</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 30 Mar 2026 12:02:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!EA9x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bd024b2-f417-483e-b116-16e03927b869_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!EA9x!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bd024b2-f417-483e-b116-16e03927b869_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!EA9x!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bd024b2-f417-483e-b116-16e03927b869_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!EA9x!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bd024b2-f417-483e-b116-16e03927b869_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!EA9x!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bd024b2-f417-483e-b116-16e03927b869_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!EA9x!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bd024b2-f417-483e-b116-16e03927b869_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!EA9x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bd024b2-f417-483e-b116-16e03927b869_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/3bd024b2-f417-483e-b116-16e03927b869_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3629659,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/190746485?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F322f13f7-2d62-41b0-bc74-b83834c27a9c_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!EA9x!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bd024b2-f417-483e-b116-16e03927b869_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!EA9x!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bd024b2-f417-483e-b116-16e03927b869_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!EA9x!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bd024b2-f417-483e-b116-16e03927b869_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!EA9x!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F3bd024b2-f417-483e-b116-16e03927b869_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><h1>Hot Take</h1><p>This book is likely the first public account of a cyber espionage campaign, orchestrated by the Russians in the late 1980s, leveraging German hacker mercenaries, to infiltrate U.S. academic institutions as a pathway into U.S. government systems. It&#8217;s the book that launched many a cybersecurity career for practitioners of a certain age (Read that as &#8220;old as dirt.&#8221;)</p><p>That said, I think it might be time to move this classic from the must-read pile to the historical-archive pile.</p><h1>My History</h1><p>I first read this book back in 1989 when I was in grad school. The U.S. Army sent me to the Naval Postgraduate School to get educated on how to become an Army automator. Read that last sentence again and you will get the flavor of Army thinking at the time (Navy school &#8594; Army Automator. Hey, don&#8217;t ask me. I just worked there.)</p><p>Instead of working on my graduate thesis (which I was far behind on), I devoured this book over a weekend. It was a revelation. For me, and many of my peers both in the service and out, this book created the path to a cybersecurity profession. It showed that cybersecurity could be a career. </p><h1>For the next 30 years</h1><p>Stoll&#8217;s book was the first thing I handed to newbies when they came to work for me. I recommended it whenever anybody asked me how to break into the field. It was one of the first books I reviewed when I started the Cybersecurity Canon Project many years ago.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://cybercanon.org/the-cuckoos-egg/&quot;,&quot;text&quot;:&quot;My 2013 Canon Review&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://cybercanon.org/the-cuckoos-egg/"><span>My 2013 Canon Review</span></a></p><p>And it was one of the first books that the Cybersecurity Canon committee inducted into the Hall of Fame back in 2016 along with Kim Zetter&#8217;s <em>Countdown to Zero Day</em> and Brian Krebs&#8217; <em>Spam Nation</em>.</p><p>But, a couple of weeks ago, the <a href="https://cybercanon.org/category/hall-of-fame/">Cybersecurity Canon Project</a> and <a href="https://thecyberguild.org/">the Cyber Guild</a> selected this book for our joint quarterly discussion. This group of about 30 northern virginia-cybersecurity-nerds meets regularly to talk about Canon Hall of Fame titles. I&#8217;m the facilitator, but I was a bit concerned. After all, the book is nearly 40 years old. I wondered whether it would still resonate. Would younger readers still see it as an inspiration even though it takes place in a world where</p><ul><li><p>Nobody had direct Internet access at home.</p></li><li><p>CompuServe was a primary gateway to being online.</p></li><li><p>AOL didn&#8217;t become a thing until 1993. </p></li><li><p>The web browser didn&#8217;t exist either. </p></li><li><p>NCSA Mosaic didn&#8217;t show up until 1993.</p></li><li><p>Cell phones were the size of bowling balls.</p></li><li><p>Most home computers ran DOS on IBM PCs (or clones). </p></li><li><p>Macs were for the cool kids, but they were niche.</p></li><li><p>Unix powered the serious university and government computers, but those systems were far removed from anything ordinary users ever experienced.</p></li></ul><p>Still, Dr. Stoll did invent incident response. Despite the new tooling available today, his method is largely unchanged. And we still haven&#8217;t solved the problem of information sharing with the government (something that Stoll complained about for the entire book). And the weakness that the German hackers leveraged across the U.S. networks was the inability of users to pick good passwords. Remarkably, this remains a problem some 60 years after Dr. Fernando Corbat&#243; introduced computer passwords at MIT.</p><p>The question is, do those facts make the book a must-read in 2026?</p><p>I don&#8217;t think so.</p><h1>My First Love</h1><p>Stoll&#8217;s &#8220;Cuckoo&#8217;s Egg&#8221; was my first love in the technology space. And it&#8217;s tough to let go of something that powerful. The thing that sealed the deal for me, the thing that cemented my love affair with it,  was after I finished the book. I immediately wrote a gushing email to the author proclaiming that the book completely changed my view of the world. Back then, email was so new that authors put their real email addresses into their books. Dr. Stoll answered me in 15 minutes. That was it. I was hooked.</p><p>But, as much as I hate to admit it, even with an incipient love letter chain started, I think it&#8217;s time to make a clean break. Like the Ariana Grande song says: &#8220;thank you, next.&#8221; <em>Cuckoo&#8217;s Egg</em> shaped how I see the world. But after 40 years, it&#8217;s time to move on.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><h1>Source</h1><p>Clifford Stoll, 1989. <strong>The Cuckoo&#8217;s Egg: Tracking a Spy Through the Maze of Computer Espionage</strong> [2016 Canon Hall of Fame  Book]. </p><ul><li><p>Goodreads. URL <a href="https://www.goodreads.com/book/show/18154.The_Cuckoo_s_Egg">https://www.goodreads.com/book/show/18154.The_Cuckoo_s_Egg</a> </p></li><li><p>Cybersecurity Canon Review: <a href="https://cybercanon.org/the-cuckoos-egg/">https://cybercanon.org/the-cuckoos-egg/</a></p></li><li><p>Buy URL: <a href="https://amzn.to/3JWAhsb">https://amzn.to/3JWAhsb</a></p></li><li><p>Buy URL: <a href="https://bookshop.org/a/119420/9781416507789">https://bookshop.org/a/119420/9781416507789</a></p></li></ul><h1>Reference</h1><p>Brian Krebs, 2014. <strong>Spam Nation: The Inside Story of Organized Cybercrime &#8212; from Global Epidemic to Your Front Door</strong> [2016 Canon Hall of Fame Book]. </p><ul><li><p>Goodreads URL: <a href="https://www.goodreads.com/book/show/18509663-spam-nation">https://www.goodreads.com/book/show/18509663-spam-nation</a></p></li><li><p>Canon URL: <a href="https://cybercanon.org/spam-nation/">https://cybercanon.org/spam-nation/</a></p></li><li><p>Buy URL: <a href="https://amzn.to/4o0m5wz">https://amzn.to/4o0m5wz</a></p></li></ul><p>Clifford Stoll, 1988. <strong>STALKING THE WILY HACKER</strong> [Journal Article]. COMMUNICATION OF THE ACM, vol. 31. No. 5. URL <a href="http://pdf.textfiles.com/academics/wilyhacker.pdf">http://pdf.textfiles.com/academics/wilyhacker.pdf</a></p><p>Clifford Stoll, 1996. <strong>Second Thoughts on the Information Highway</strong> [Presentation]. C-SPAN. URL https://www.c-span.org/program/public-affairs-event/second-thoughts-on-the-information-highway/132866</p><p>Clifford Stoll, 1999. <strong>High Tech Heretic</strong> [Book Discussion. C-SPAN. URL https://www.c-span.org/program/book-tv/high-tech-heretic/133700</p><p>Clifford Stoll, Brian Lamb, 1996. <strong>Cuckoo&#8217;s Egg Discussion</strong> [Author Interview]. C-SPAN. URL https://www.c-span.org/program/public-affairs-event/second-thoughts-on-the-information-highway/132866</p><p>Clifford Stoll, 2008. <strong>Clifford Stoll: Astronomer, educator, skeptic</strong> [Bio]. TED Talks. URL https://www.ted.com/speakers/clifford_stoll</p><p>Clifford Stoll, 2008. <strong>The call to learn</strong> [Ted Talk]. TED. URL https://www.ted.com/talks/clifford_stoll_the_call_to_learn</p><p>Clifford Stoll, n.d. <strong>Acme Klein Bottle</strong> [Company Web Page]. URL https://www.kleinbottle.com/ </p><p>Clifford Stoll, n.d. <strong>Why read The Cuckoo&#8217;s Egg?</strong> [Book Explainer]. Book DNA. URL https://bookdna.com/book/the-cuckoos-egg </p><p>David Kahn, 1967. <strong>The Codebreakers: The Comprehensive History of Secret Communication from Ancient Times to the Internet</strong> [Book]. Goodreads. URL https://www.goodreads.com/book/show/29608.The_Codebreakers</p><p>James Bamford, 1982. <strong>The Puzzle Palace: Inside the National Security Agency, America&#8217;s Most Secret Intelligence Organization</strong> [Book]. Goodreads. URL https://www.goodreads.com/book/show/804860.The_Puzzle_Palace</p><p>John Markoff, 1989. <strong>West Germans Raid Spy Ring That Violated U.S. Computers</strong> [News]. The New York Times. URL https://www.nytimes.com/1989/03/03/world/west-germans-raid-spy-ring-that-violated-us-computers.html</p><p>Kim Zetter, 2014. <strong>Countdown to Zero Day: Stuxnet and the Launch of the World&#8217;s First Digital Weapon</strong> [2016 Canon Hall of Fame Book]. </p><ul><li><p>Goodreads URL: <a href="https://www.goodreads.com/book/show/18465875-countdown-to-zero-day">https://www.goodreads.com/book/show/18465875-countdown-to-zero-day</a> </p></li><li><p>Canon Review URL: <a href="https://cybercanon.org/countdown-to-zero-day-stuxnet-and-the-launch-of-the-worlds-first-digital-weapon/">https://cybercanon.org/countdown-to-zero-day-stuxnet-and-the-launch-of-the-worlds-first-digital-weapon/</a></p></li><li><p>Amazon Buy URL: <a href="https://amzn.to/3JVc99m">https://amzn.to/3JVc99m</a></p></li></ul><p>Staff, n.d. GNU Emacs [Product Page. GNU Project. URL https://www.gnu.org/software/emacs/</p><p>Staff, n.d. <strong>The 1988 Morris worm, the internet&#8217;s first cyberattack</strong> [History]. Lawrence Livermore National Laboratory. URL https://st.llnl.gov/news/look-back/1988-morris-worm-internets-first-cyberattack</p><p>William E. Burrows, 1986. <strong>Deep Black: Space Espionage and National Security</strong> [Book]. Goodreads. URL https://www.goodreads.com/book/show/887319.Deep_Black</p><p>Ariana Grande, 2018. thank u, next (Official Video) [Music Video] YouTube</p><div id="youtube2-gl1aHhXnN1k" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;gl1aHhXnN1k&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/gl1aHhXnN1k?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p></p><p>Cliff Stoll, 2013. <strong>The KGB, the Computer, and Me.</strong> [WWW Document]. NOVA - YouTube. URL</p><div id="youtube2-PGv5BqNL164" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;PGv5BqNL164&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/PGv5BqNL164?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p></p><p>Clifford Stoll, 2017. <strong>Secrets to measuring a piece of paper</strong>  [Explainer]. Numberphile - YouTube. URL</p><div id="youtube2-9yUZTTLpDtk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;9yUZTTLpDtk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/9yUZTTLpDtk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p></p><p>Cliff Stoll, 2017. (Still) Stalking the Wily Hacker [Keynote]. SANS Digital Forensics and Incident Response CTI Summit - YouTube, URL:</p><div id="youtube2-1h7rLHNXio8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;1h7rLHNXio8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/1h7rLHNXio8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Tuesday at the RSA Conference]]></title><description><![CDATA[I&#8217;m conducting a two-hour hands on risk forecasting workshop with my colleague Brandon Karpf today.]]></description><link>https://diffuser.substack.com/p/tuesday-at-the-rsa-conference</link><guid isPermaLink="false">https://diffuser.substack.com/p/tuesday-at-the-rsa-conference</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Wed, 25 Mar 2026 09:17:40 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Zahl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7379bc87-7852-42d4-9fd9-a4c25f626eb6_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Zahl!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7379bc87-7852-42d4-9fd9-a4c25f626eb6_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Zahl!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7379bc87-7852-42d4-9fd9-a4c25f626eb6_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!Zahl!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7379bc87-7852-42d4-9fd9-a4c25f626eb6_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!Zahl!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7379bc87-7852-42d4-9fd9-a4c25f626eb6_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!Zahl!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7379bc87-7852-42d4-9fd9-a4c25f626eb6_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Zahl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7379bc87-7852-42d4-9fd9-a4c25f626eb6_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/7379bc87-7852-42d4-9fd9-a4c25f626eb6_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3193561,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/191856807?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7379bc87-7852-42d4-9fd9-a4c25f626eb6_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Zahl!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7379bc87-7852-42d4-9fd9-a4c25f626eb6_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!Zahl!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7379bc87-7852-42d4-9fd9-a4c25f626eb6_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!Zahl!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7379bc87-7852-42d4-9fd9-a4c25f626eb6_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!Zahl!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F7379bc87-7852-42d4-9fd9-a4c25f626eb6_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I&#8217;m conducting a two-hour hands on risk forecasting workshop with my colleague Brandon Karpf today. If you&#8217;re in town, come on by. I would love to see.</p><p>But if you can&#8217;t make that, I&#8217;m doing a book signing for my Cybersecurity First Principles book over at the book store immediately after.</p><p>See you there!</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[The Great Annual Cybersecurity Nerdfest]]></title><description><![CDATA[Cybersecurity Canon Activities at the RSA Conference this Week]]></description><link>https://diffuser.substack.com/p/the-great-annual-cybersecurity-nerdfest</link><guid isPermaLink="false">https://diffuser.substack.com/p/the-great-annual-cybersecurity-nerdfest</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Tue, 24 Mar 2026 12:05:44 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!4DQO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277d25-0017-493c-b37b-78f6c6972b08_1242x694.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4DQO!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277d25-0017-493c-b37b-78f6c6972b08_1242x694.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4DQO!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277d25-0017-493c-b37b-78f6c6972b08_1242x694.png 424w, https://substackcdn.com/image/fetch/$s_!4DQO!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277d25-0017-493c-b37b-78f6c6972b08_1242x694.png 848w, https://substackcdn.com/image/fetch/$s_!4DQO!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277d25-0017-493c-b37b-78f6c6972b08_1242x694.png 1272w, https://substackcdn.com/image/fetch/$s_!4DQO!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277d25-0017-493c-b37b-78f6c6972b08_1242x694.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4DQO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277d25-0017-493c-b37b-78f6c6972b08_1242x694.png" width="1242" height="694" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ef277d25-0017-493c-b37b-78f6c6972b08_1242x694.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:694,&quot;width&quot;:1242,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1067805,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/191850694?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277d25-0017-493c-b37b-78f6c6972b08_1242x694.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4DQO!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277d25-0017-493c-b37b-78f6c6972b08_1242x694.png 424w, https://substackcdn.com/image/fetch/$s_!4DQO!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277d25-0017-493c-b37b-78f6c6972b08_1242x694.png 848w, https://substackcdn.com/image/fetch/$s_!4DQO!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277d25-0017-493c-b37b-78f6c6972b08_1242x694.png 1272w, https://substackcdn.com/image/fetch/$s_!4DQO!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fef277d25-0017-493c-b37b-78f6c6972b08_1242x694.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>RSAC 2026 is occurring March 23-26! Here is your one-stop shop for RSAC sessions or activities with ties to the Cybersecurity Canon!</p><p>The sections below include Book Signings, Canon Author and Committee Member Speaking sessions, Birds of a Feather sessions, and even representation at College Day.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><div><hr></div><h2><strong>Book Signings: Opportunities with Authors of Hall of Fame/Nominated</strong></h2><p>Author: <strong>Ross Haleliuk</strong></p><ul><li><p>Book: <strong><a href="https://cybercanon.org/cyber-for-builders/">Cyber for Builders</a></strong>, Hall of Fame Nominee</p></li><li><p>When: Tuesday, Mar 24 at 11 AM PDT (after Ross&#8217; speaking session)</p></li><li><p>Where: RSAC Bookstore</p></li></ul><p>Author: <strong>Helen Patton</strong></p><ul><li><p>2025 Hall of Fame winner for <strong><a href="https://cybercanon.org/navigating-the-cybersecurity-career-path/">Navigating the Cybersecurity Career Path</a></strong></p></li><li><p>Book: <strong><a href="https://www.amazon.com/-/he/Switching-Cyber-Mid-Career-Launching-Cybersecurity/dp/B0G5XVF298">Switching to Cyber: The Mid-Career Guide to Launching a Cybersecurity Career</a></strong></p></li><li><p>When: Tue 3/24 at 1pm</p></li><li><p>Where: RSAC bookstore</p></li></ul><p>Author: <strong>Rick Howard (Me)</strong></p><ul><li><p>Book: <strong><a href="https://cybercanon.org/cybersecurity-first-principles-a-reboot-of-strategy-and-tactics/">Cybersecurity First Principles: A Reboot of Strategy and Tactics</a></strong>, 2026 Hall of Fame Winner</p></li><li><p>When: Tuesday 3/24 at 3:45pm</p></li><li><p>Where: RSAC bookstore</p></li></ul><p>Author: <strong>Cassie Crossley</strong></p><ul><li><p>Book: <strong><a href="https://cybercanon.org/software-supply-chain-security-2024-by-cassie-crossley/">Software Supply Chain Security: Securing the End-to-End Supply Chain for Software, Firmware, and Hardware</a></strong></p></li><li><p>When: Thursday, Mar 26 1:00 - 1:45 PM PDT</p></li><li><p>Where: RSAC bookstore</p></li></ul><div><hr></div><h2><strong>CyberCanon&#8217;s Hall of Fame Authors and Committee Member&#8217;s Sessions</strong></h2><p><strong>MONDAY</strong></p><p>Author: <strong><a href="https://www.linkedin.com/in/carolinewmwong/">Caroline Wong</a></strong></p><ul><li><p>Books: <strong><a href="https://cybercanon.org/security-metrics-a-beginners-guide/">Security Metrics: A Beginner&#8217;s Guide</a></strong>, Hall of Fame Nominee</p></li><li><p>Session 1:<strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1755191997895001ZxG0">The Foundations of AI</a> </strong></p></li><li><p>When: Monday, Mar 23 8:30 AM - 9:20 AM PDT</p></li></ul><p>CyberCanon Committee Member: <strong><a href="https://www.linkedin.com/in/adrian-sanabria/">Adrian Sanabria</a></strong></p><ul><li><p>Session: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1756101254392001bKZA">A Failure Is a Terrible Thing to Waste: The Case for Breach Transparency</a></strong></p></li><li><p>When: Monday, Mar 23 9:40 AM - 10:30 AM PDT</p></li></ul><p>Author: <strong>Nicole Perlroth</strong></p><ul><li><p>Author of <strong><a href="https://cybercanon.org/to-catch-a-thief-chinas-rise-to-cyber-supremacy/">To Catch a Thief: China&#8217;s Rise to Cyber Supremacy</a></strong> and <strong><a href="https://cybercanon.org/this-is-how-they-tell-me-the-world-ends/">Hall of Fame book: This Is How They Tell Me The World Ends</a></strong></p></li><li><p>Session 1: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1755303032310001LqF7">Resilient Infrastructure as National Defense: The Digital Front Line</a></strong></p></li><li><p>When: Monday, Mar 23 9:40 AM - 10:30 AM PDT</p></li></ul><p>CCC Member &amp; Author: <strong>Cassie Crossley</strong></p><ul><li><p>Author of <strong><a href="https://cybercanon.org/software-supply-chain-security-2024-by-cassie-crossley/">Software Supply Chain Security</a></strong></p></li><li><p>Session: <strong><a href="https://thepurplebook.club/pbc-connect-rsac">Panel: Preparing for the EU Cyber Resilience Act</a></strong></p></li><li><p>When: Monday, Mar 23 1:00 - 1:45 PM PDT</p></li></ul><p>Canon Committee Member: <strong>Meghan Jacquot</strong></p><ul><li><p>Session: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1766352920142001yQ4N">Belonging in Cyber: Building a Trusted Community</a></strong></p></li><li><p>When: Monday, Mar 23 1:10 PM - 2:00 PM PDT</p></li></ul><p>Author: <strong>Roger Grimes</strong></p><ul><li><p>Author of Hall of Fame Nominee book: <strong><a href="https://cybercanon.org/cryptography-apocalypse-preparing-for-the-day-when-quantum-computing-breaks-todays-crypto/">Preparing for the Day When Quantum Computing Breaks Today&#8217;s Crypto</a></strong></p></li><li><p>Session: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1753899213932001J19R">Who Would Fall for That? Foundations of Avoiding Scary Scams</a></strong></p></li><li><p>When: Monday, Mar 23 2:20 PM - 3:10 PM PDT</p></li></ul><p><strong>TUESDAY</strong></p><p>Author: <strong>Ross Haleliuk</strong></p><ul><li><p>Author of <strong><a href="https://cybercanon.org/cyber-for-builders/">HoF Nominee &#8220;Cyber for Builders&#8221;</a></strong></p></li><li><p>Session: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1755922637088001fJ9o">Inside the Network Live: Winning as an Incumbent in the Age of AI</a></strong></p></li><li><p>When: Tuesday, Mar 24 9:40 AM - 10:30 AM PDT</p></li></ul><p>Author: <strong>George Kurtz</strong></p><ul><li><p>Co-author of Hall of Fame book <strong><a href="https://cybercanon.org/hacking-exposed-series/">Hacking Exposed</a></strong> with Stuart McClure, Joel Scambray</p></li><li><p>Session 1: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1772146653594001eTZY">The Crash Test is Over: New Standards of Command for AI Safety</a></strong></p></li><li><p>When: Tuesday, Mar 24 10:50 AM - 11:10 AM PDT</p></li></ul><p>Author: <strong>Rick Howard (Me)</strong></p><ul><li><p>Presenting with Brandon Karpf</p></li><li><p>Session: <strong>LAB2-T09 - First Principles Risk Forecasting: From Theory to Practice</strong></p></li><li><p>When: Tuesday, Mar 24 1:15 PM - 3:15 PM PDT</p></li></ul><p><strong>WEDNESDAY</strong></p><p>Author: <strong>Sounil Yu</strong></p><ul><li><p>Author of: <strong><a href="https://cybercanon.org/cyber-defense-matrix-the-essential-guide-to-navigating-the-cybersecurity-landscape/">Cyber Defense Matrix: The Essential Guide to Navigating the Cybersecurity Landscape</a></strong></p></li><li><p>Session: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1755976365266001UUwk">When Dollars Don&#8217;t Make Sense: Rethinking Cyber Risk Quantification</a></strong></p></li><li><p>When: Wednesday, Mar 25 9:40 AM - 10:30 AM PDT</p></li></ul><p>Author: <strong>Rock Lambros</strong></p><ul><li><p>Book: <strong><a href="https://cybercanon.org/the-ciso-evolution-business-knowledge-for-cybersecurity-executives/">The CISO Evolution: Business Knowledge for Cybersecurity Executives</a></strong> with Matthew Sharp)</p></li><li><p>Session: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1755898390625001bqTN">The Unsolvable Problem: Right to Erasure and Irreversible Nature of LLMs</a></strong></p></li><li><p>When: Wednesday, Mar 25 9:40 AM - 10:30 AM PDT</p></li></ul><p>CCC member &amp; Author: <strong>Cassie Crossley</strong></p><ul><li><p>Author of <strong><a href="https://cybercanon.org/software-supply-chain-security-2024-by-cassie-crossley/">Software Supply Chain Security</a></strong></p></li><li><p>Session: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1755558770886001Rggb">Panel: Supply Chain Under Siege: Strategic Defense in a Regulated World</a></strong></p></li><li><p>When: Wednesday, Mar 25 1:15 - 2:05 PM PDT</p></li></ul><p>Author: <strong>Brian Krebs</strong></p><ul><li><p>Author of Hall of Fame book: <strong><a href="https://cybercanon.org/spam-nation/">Spam Nation</a></strong></p></li><li><p>Session: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1767978438038001goDz">From Infiltration to Disruption: Taking on the Russian Cyber Mob</a></strong></p></li><li><p>When: Wednesday, Mar 25 1:15 PM - 2:05 PM PDT</p></li></ul><p>Canon Co-Founder and Author: <strong><a href="https://www.linkedin.com/in/helenpatton/">Helen Patton</a></strong></p><ul><li><p>Author of the 2025 Hall of Fame winner, <strong><a href="https://cybercanon.org/navigating-the-cybersecurity-career-path/">Navigating the Cybersecurity Career Path, and</a> </strong>also author of <strong><a href="https://www.amazon.com/-/he/Switching-Cyber-Mid-Career-Launching-Cybersecurity/dp/B0G5XVF298">Switching to Cyber: The Mid-Career Guide to Launching a Cybersecurity Career</a></strong></p></li><li><p>Session: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1755453942256001MymE">Beyond Jericho: Salvaging Zero Trust from Buzzword Bingo</a></strong></p></li><li><p>When: Wednesday, Mar 25 1:15 PM - 2:05 PM PDT</p></li></ul><p>Author: <strong><a href="https://www.linkedin.com/in/carolinewmwong/">Caroline Wong</a></strong></p><ul><li><p>Author of Hall of Fame Nominee book: <strong><a href="https://cybercanon.org/security-metrics-a-beginners-guide/">Security Metrics: A Beginner&#8217;s Guide</a></strong></p></li><li><p>Session 2: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1766346761940001LNt8">The Fundamentals Forum: Let&#8217;s Get Back to Basics</a></strong></p></li><li><p>When: Wednesday, Mar 25 2:25 PM - 3:15 PM PDT</p></li></ul><p>Author: <strong>Bruce Schneier</strong></p><ul><li><p>Lifetime Achievement Author of <strong><a href="https://cybercanon.org/secrets-and-lies-digital-security-in-a-networked-world/">Secrets and Lies</a></strong>, <strong><a href="https://cybercanon.org/data-and-goliath-the-hidden-battles-to-collect-your-data-and-control-your-world/">Data and Goliath, and</a></strong> <strong><a href="https://cybercanon.org/click-here-to-kill-everybody-security-and-survival-in-a-hyper-connected-world/">Click Here to Kill Everybody</a></strong></p></li><li><p>Session: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1765835935731001AfKr">Integrous System Design</a> </strong></p></li><li><p>When: Wednesday, Mar 25 2:25 PM - 3:15 PM PDT</p></li></ul><p><strong>THURSDAY</strong></p><p>Author: <strong>Nicole Perlroth</strong></p><ul><li><p>Author of <strong><a href="https://cybercanon.org/to-catch-a-thief-chinas-rise-to-cyber-supremacy/">To Catch a Thief: China&#8217;s Rise to Cyber Supremacy</a></strong> and <strong><a href="https://cybercanon.org/this-is-how-they-tell-me-the-world-ends/">Hall of Fame book: This Is How They Tell Me The World Ends</a></strong></p></li><li><p>Session 2: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1755735718684001x6s3">The Cyber Threat Landscape: Year in Review, Future in Focus</a></strong></p></li><li><p>When: Thursday, Mar 26 8:30 AM - 9:20 AM PDT</p></li></ul><p>Author: <strong>George Kurtz</strong></p><ul><li><p>Co-author of Hall of Fame book <strong><a href="https://cybercanon.org/hacking-exposed-series/">Hacking Exposed</a></strong> with Stuart McClure, Joel Scambray</p></li><li><p>Session 2: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1755652023018001nSEA">Hacking Exposed</a></strong></p></li><li><p>When: Thursday, Mar 26 10:50 AM - 11:40 AM PDT</p></li></ul><div><hr></div><h2><strong>Bird of Feather sessions</strong></h2><p>Author: <strong>Kelly Shortridge</strong></p><ul><li><p>BoF Topic: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1770651235418001uxiV">Adapting to the Unknown: Resilience Engineering in a Time of Chaos</a></strong></p></li><li><p>Book: <strong><a href="https://cybercanon.org/security-chaos-engineering-sustaining-resilience-in-software-and-systems/">Security Chaos Engineering: Sustaining Resilience in Software and Systems</a>,</strong> 2026 Hall of Fame Winner</p></li><li><p>When: Monday, Mar 23 1:10 PM - 2:00 PM PDT</p></li></ul><p>CCC Member &amp; Author: <strong>Cassie Crossley</strong></p><ul><li><p>BoF Topic: <strong><a href="https://path.rsaconference.com/flow/rsac/us26/FullAgenda/page/catalog/session/1768710130568001fP5P">Exploitable or Not? CRA-Ready Product Security Triage for CVEs</a></strong></p></li><li><p>Cassie is the author of <strong><a href="https://cybercanon.org/software-supply-chain-security-2024-by-cassie-crossley/">Software Supply Chain Security</a></strong></p></li><li><p>When: Thursday, Mar 26 1:00 - 2:20 PM PDT</p></li></ul><div><hr></div><h2><strong>Other</strong></h2><p><strong><a href="https://www.rsaconference.com/rsac-programs/college-day">College day</a></strong>:<strong> </strong>Meghan Jacquot of the CyberCanon Committee is volunteering at College Day to help give feedback to college students on their resumes</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[RSA Next Week]]></title><description><![CDATA[Next week I&#8217;ll be at the RSA Conference in San Francisco wearing a few different hats.]]></description><link>https://diffuser.substack.com/p/rsa-next-week</link><guid isPermaLink="false">https://diffuser.substack.com/p/rsa-next-week</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 16 Mar 2026 12:04:02 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!IXX-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb21bd1f-6322-457b-ac31-6fcd64888279_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!IXX-!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb21bd1f-6322-457b-ac31-6fcd64888279_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!IXX-!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb21bd1f-6322-457b-ac31-6fcd64888279_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!IXX-!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb21bd1f-6322-457b-ac31-6fcd64888279_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!IXX-!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb21bd1f-6322-457b-ac31-6fcd64888279_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!IXX-!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb21bd1f-6322-457b-ac31-6fcd64888279_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!IXX-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb21bd1f-6322-457b-ac31-6fcd64888279_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb21bd1f-6322-457b-ac31-6fcd64888279_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3477303,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/191007604?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb21bd1f-6322-457b-ac31-6fcd64888279_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!IXX-!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb21bd1f-6322-457b-ac31-6fcd64888279_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!IXX-!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb21bd1f-6322-457b-ac31-6fcd64888279_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!IXX-!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb21bd1f-6322-457b-ac31-6fcd64888279_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!IXX-!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb21bd1f-6322-457b-ac31-6fcd64888279_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>Next week I&#8217;ll be at the RSA Conference in San Francisco wearing a few different hats.</p><p><strong>Cybersecurity Canon</strong> &#8211; I&#8217;ll be recruiting new volunteers and committee members, talking with vendors about partnerships, and spending some time at the conference bookstore concierge desk.</p><p><strong>First Principles Consulting</strong> &#8211; I&#8217;m meeting with clients and Substack readers, and hopefully connecting with a few new ones.</p><p><strong>Author</strong> &#8211; I&#8217;ll also be running a hands-on risk forecasting workshop based on <em>Cybersecurity First Principles</em> and doing a book signing at the conference bookstore.</p><p>RSA week tends to fill up fast, but if you&#8217;re attending and want to grab a coffee, I&#8217;d love to meet. My calendar is already getting tight, but if we can find an opening, let&#8217;s make it happen.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://koalendar.com/e/rick-howard-rsa-conference-meetings&quot;,&quot;text&quot;:&quot;Schedule a meeting at RSA&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://koalendar.com/e/rick-howard-rsa-conference-meetings"><span>Schedule a meeting at RSA</span></a></p><p></p><p>Here is my schedule as it stands now:</p><p></p><p><strong>Cybersecurity Canon Committee Breakfast</strong></p><blockquote><p>When: Tuesday, Mar 24, 7AM</p><p>Where: Mel&#8217;s Drive-In, 801 Mission St, San Francisco, CA 94103, USA</p><p>Who&#8217;s Invited: All Committee and staff </p></blockquote><p></p><p><strong>Book Signing: </strong></p><blockquote><p>Author: <strong>Rick Howard </strong><br>Book: <a href="https://cybercanon.org/cybersecurity-first-principles-a-reboot-of-strategy-and-tactics/">Cybersecurity First Principles: A Reboot of Strategy and Tactics</a></p><p>When: Tuesday 3/24 at 3:45pm <br>Where: RSAC bookstore </p></blockquote><p></p><p><strong>Workshop: </strong></p><blockquote><p>Session: <strong>LAB2-T09 - First Principles Risk Forecasting: From Theory to Practice</strong></p><p>When: Tuesday, Mar 24 1:15 PM - 3:15 PM PDT</p></blockquote><p></p><p><strong>Cybersecurity Canon Book Store Concierge Desk</strong></p><blockquote><p>When: Tuesday and Wednesday, Mar 24 and 25th, 2-4 PM</p><p>Where: RSA Book Store at Moscone Center</p></blockquote><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p>]]></content:encoded></item><item><title><![CDATA[The First Principle of Cybersecurity]]></title><description><![CDATA[After ten years of arguing about tactics, here is the one idea every security program should start with.]]></description><link>https://diffuser.substack.com/p/the-first-principle-of-cybersecurity</link><guid isPermaLink="false">https://diffuser.substack.com/p/the-first-principle-of-cybersecurity</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 09 Mar 2026 13:02:59 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!h8QT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b1be3c-9085-4c4f-957c-2cf527950d81_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!h8QT!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b1be3c-9085-4c4f-957c-2cf527950d81_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!h8QT!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b1be3c-9085-4c4f-957c-2cf527950d81_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!h8QT!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b1be3c-9085-4c4f-957c-2cf527950d81_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!h8QT!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b1be3c-9085-4c4f-957c-2cf527950d81_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!h8QT!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b1be3c-9085-4c4f-957c-2cf527950d81_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!h8QT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b1be3c-9085-4c4f-957c-2cf527950d81_1024x1536.png" width="440" height="660" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/85b1be3c-9085-4c4f-957c-2cf527950d81_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:440,&quot;bytes&quot;:3914308,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/190046176?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b1be3c-9085-4c4f-957c-2cf527950d81_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!h8QT!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b1be3c-9085-4c4f-957c-2cf527950d81_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!h8QT!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b1be3c-9085-4c4f-957c-2cf527950d81_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!h8QT!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b1be3c-9085-4c4f-957c-2cf527950d81_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!h8QT!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F85b1be3c-9085-4c4f-957c-2cf527950d81_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p>Since the start of the year, I&#8217;ve been working my way toward this essay. If you run a Substack called <em>Rick&#8217;s First Principles</em> and you&#8217;ve spent an entire career in cybersecurity, sooner or later you have to answer the obvious question: what is the actual first principle of cybersecurity?</p><p>I wrote three essays to prep the ground.</p><ul><li><p>The first explains why first-principle thinking matters at all (<a href="https://diffuser.substack.com/p/first-principle-thinking">First Principle Thinking</a>).</p></li><li><p>The second looks at who else has tried to define cybersecurity first principles (<a href="https://diffuser.substack.com/p/prior-research-on-cybersecurity-first">Prior Research on Cybersecurity First Principles</a>).</p></li><li><p>The third examines what most security professionals claim the first principle is and why those answers fall short (<a href="https://diffuser.substack.com/p/the-cybersecurity-ballot">The Cybersecurity Ballot: Meet the Perennial Candidates</a>).</p></li></ul><p>The main lesson from the <em>Perennial Candidates</em> essay is that the usual answers miss the mark. They are either too simple or too tactical. They focus on technical activities: preventing exploits, blocking malware, detecting and removing attacker tools, following compliance checklists, or meeting legal requirements. All of those things matter. But none of them explain the real purpose of a security program. When you read these candidates, the reaction is immediate: <em>Yes, that&#8217;s useful, but what about everything else?</em> Each one addresses a narrow slice of the problem. None of them describes the whole mission in terms that senior leadership can understand.</p><p>There&#8217;s another issue. These candidates are binary tasks. Either you complete them or you don&#8217;t. There&#8217;s no middle ground.</p><p>With that groundwork in place, it&#8217;s time to put a stake in the ground and describe what I believe the true cybersecurity first principle is.</p><h1>Think in Terms of Probabilities</h1><p>Instead of a binary metric, we should be thinking in terms of a sliding scale, something like a probability. We need to build a program that matches leadership&#8217;s risk appetite toward the business. Our first principle program should drive us closer to reducing the probability of a cyber adversary damaging the business. That gives us some planning room. For example, we can tell the boss that because we invested X amount of dollars on a new security tool or a new security function, we reduced the probability of an adversary group damaging the business from 20 percent to 15 percent. When we present the infosec program in that manner, then leadership can evaluate whether the spend for the project was worth the effort.</p><p>And if it does happen, an adversary successfully steals our intellectual property or encrypts our data, the infosec program is not an instant failure. We didn&#8217;t tell the boss that we would stop all adversary campaigns. We told them that we would reduce the probability of a successful one.</p><p>That&#8217;s getting closer to our absolute first principle. It&#8217;s no longer a binary question because we couched it in terms of probabilities for the leadership to consider. But it&#8217;s still missing something. It&#8217;s still too broad and will cause us to spend resources on things that aren&#8217;t important.</p><h1>Think in Terms of Materiality</h1><p>What&#8217;s missing is a discussion of materiality. Face it, not everything on your network is essential. If the bad guys compromise Luigi&#8217;s laptop and steal the menu for the lunch special in the company cafeteria, maybe we don&#8217;t need to call in the FBI for that one. You might be a little embarrassed, but the exfiltration of the lunch menu to the APT&#8217;s command-and-control server in Tajikistan will not cause the company much heartburn. So, why then would we spend a lot of resources trying to protect it?</p><p>I don&#8217;t know about you, but the volume of resources that I typically get to spend on cybersecurity has never been infinite. If you try to spread that volume thinly over everything, you run out of resources before you run out of things to do anyway. The projects that you did funnel money to are likely not funded completely enough to solve the entire problem. That&#8217;s like trying to feed a platoon of neighborhood teenagers with one spoonful of Jif peanut butter (extra crunchy of course).  Nobody is going to be satisfied at the conclusion of that exercise. The clear answer is to focus only on what is material to the business. Everything else is nice to have.</p><h1>Public Company Materiality</h1><p>If you&#8217;re a public company, Supreme Court Justice Thurgood Marshall crafted the landmark judicial definition of materiality in 1976.  He wrote in the TSC Industries vs Northway case that a fact is &#8220;material&#8221; if there is</p><blockquote><p>... a substantial likelihood that a reasonable shareholder would consider it important in deciding how to vote &#8230; [or] ... a substantial likelihood that the disclosure of the omitted fact would have been viewed by the reasonable investor as having significantly altered the &#8216;total mix&#8217; of information made available.&#8221;</p></blockquote><p>Phew! That is a mouthful. Let me restate that in English. For a public company in the United States, &#8220;materiality&#8221; is any event that significantly impacts share value. </p><p>That seems straightforward enough until you view it through the lens of cybersecurity. Except for some obvious significant public cyber attacks, like the 2017 Russian NotPetya campaign where the total estimated damage worldwide was north of $10 billion, network defenders have struggled with articulating materiality. Historically, public companies have never really addressed cybersecurity material risk in their earnings calls; at least, not as a matter of course. Business leaders and infosec professionals haven&#8217;t had the language to bridge the gap between typical business materiality issues, like mergers and acquisitions, and the infosec professional&#8217;s favorite tool to convey cybersecurity risk, the heat  map.</p><p>That started to change in 2023. The U.S. Securities and Exchange Commission, the SEC, approved a new rule for all public companies: Leadership must report material cyber events within four business days.  All of a sudden, cybersecurity materiality became a real thing that security practitioners in public companies needed to worry about.  Every public company CISO worth their salt made a beeline to the CFO&#8217;s office in order to come to some understanding about how they were going to define cybersecurity materiality going forward.</p><p>But hold the phone. In a landmark decision in 2024, the US Supreme Court reversed its 1984 ruling in the case of Chevron v. the Natural Resources Defense Council, better known as the Chevron doctrine,  that allowed federal agencies, like the SEC,  to enforce their own rules in lieu of specific laws passed by Congress.  Chief Justice John Roberts called the Chevron doctrine &#8220;fundamentally misguided.&#8221;  </p><p>And with President Trump releasing the hounds in 2025 to eliminate US government inefficiency in big government institutions, like the SEC, who knows if the SEC will even be around in a couple of years. All of this introduces a period of uncertainty for the enforcement of the SEC&#8217;s cybersecurity reporting rule in public companies. The SEC rule doesn&#8217;t go away, but now, public companies have a legal path for noncompliance. </p><p>What a mess.</p><h1>Materiality for Everybody</h1><p>Despite the SEC Rule then, materiality is still an essential concept. But we still haven&#8217;t answered the question: what is it? </p><p>If you take any three random people walking down the hallway at your headquarters building and lock them in a room with a white board for an hour, they could probably come up with hundreds of potential risks to the business or to some government mission. Some risks would be more likely than others and some would have more impact than others, but the list would be long. If you then brought the senior leaders of the organization into the room, they would most likely extend the list by some meaningful number. </p><p>But let me be blunt. A material issue is a potential company killer,  organization killer, or mission killer. If you&#8217;re trying to prioritize the team&#8217;s future work, dividing the potential risks into mission Killers and everything else is a useful exercise. It tends to focus the leadership.</p><p>When the REvil hacker gang  launched a ransomware attack against Travelex on New Year&#8217;s Eve in 2020, the company quickly had to fall into administration. It became insolvent and was unable to pay its debts. That&#8217;s a company killer. </p><p>In 2014, the Deep Panda Chinese hacker group stole the personnel files  of every US government employee past and present from the US Office of Personnel Management (OPM). This is perhaps the most impactful cyber espionage campaign known to the public against any country. One of OPM&#8217;s primary missions was to  protect the government&#8217;s personnel files.  OPM completely failed to protect its only material asset: the employee background database</p><p>In the U.S. government, that&#8217;s not just a list of names and social security numbers. That&#8217;s a list of everything you have ever done for the past decade; where you lived, who your neighbors were, who your relatives are and where they lived, every crime you&#8217;ve ever committed, and every vice you&#8217;ve ever had (drugs, prostitution, etc). Deep Panda vacuumed it all up into the Chinese intelligence machine.</p><p>That&#8217;s a mission killer. </p><p>Since none of us has an infinite supply of resources in the people-process-technology triad, it makes sense to completely focus our first principle strategies to protect the material things in our environments and not get distracted by all the other things.  </p><p>And, I hear what you&#8217;re saying. There are plenty of potential risks that fall short of the company-organization-mission killer paradigm that would still be significantly painful; that would cause serious disruption to current planning and progress. You could make the case that some of these risks might be material too. Fair enough. But let&#8217;s start with the company-organization-mission killers first and work back from there. Those are absolutely material.</p><p>Back in 1999, the SEC said that a good rule of thumb is 5% of revenue as a starting place for a material number. In 2025 I heard Richard Seiersen, Canon Hall of Fame author for &#8220;How to Measure Everything in Cybersecurity Risk&#8221; said  at a risk forecasting workshop that a good material number to consider is whatever insurance coverage you have plus whatever cash on-hand is available.</p><p>The thing is, what&#8217;s material and what isn&#8217;t is different for every organization. It depends on factors such as risk tolerance, organizational size, and whether the organization is commercial, academic, or governmental. It also changes over time. What&#8217;s material for a startup today won&#8217;t be what&#8217;s material when the startup becomes a Silicon Valley tech giant down the road. </p><h1>Think in Terms of a Limited Timespan</h1><p>So far then, we have &#8220;reducing the probability of a material cyber event&#8221; shaping up as our ultimate first cybersecurity principle, but it&#8217;s still missing something; it&#8217;s still not precise enough. With what we have right now, we would be calculating probabilities of material cyber events indefinitely into  the future.</p><p>Calculating the probability of material impact to an organization any time in the future (say the next 100 years) is a lot different than calculating the probability over the next year. Will cyber adversaries successfully breach our digital environments sometime in the future? That&#8217;s likely if the question is open-ended like that, if there&#8217;s no end date. But, will they have success in the next year? That probability likely will drop off precipitously if you time bound the question. It also has the added benefit of giving senior leadership something to focus on. Instead of using fear, uncertainty, and doubt (FUD) to get your infosec program funded, as in, &#8220;OMG, this is a really scary thing and I need a gazillion dollars to fix it.&#8221; It&#8217;s just another risk in the set of hundreds that the boss has to deal with. Let&#8217;s not try to boil the ocean here. Let&#8217;s timebound our risk calculations to some meaningful but short timeframe in the future. It can be three years, one year, six months; whatever is meaningful to the business.</p><p></p><h1>Drum Roll Please: The Cybersecurity First Principle</h1><p></p><p>We have all the preliminaries covered. It&#8217;s time for me to reveal what I think is the absolute cybersecurity first principle; our initial building block, the atomic element, that we will base the entire infosec program on. Remember, it must address three things:  probability, materiality, and time. </p><p>Here is my proposal:</p><div class="pullquote"><h1>Reduce the probability of a material cyber event over the next business cycle.</h1></div><p>That&#8217;s it. Nothing else matters. This simple statement is atomic. You don&#8217;t read it and say to yourself, &#8220;I like it but there are three other things I have to do too.&#8221; Compared to the other first principle candidates discussed earlier, it states precisely and clearly what we are trying to accomplish. And it doesn&#8217;t matter what kind of organization you are: Public Company, Private Company, Government organization, or Academic institution.</p><p>This has the same feel as the core statements produced by other first-principles thinkers (like Euclid, Descartes, even Musk) when they stripped problems down to their fundamentals (see the earlier essay on first-principles thinking). It doesn&#8217;t rely on precedent (how things were done before), analogy (this looks like X), authority (what experts, standards, or competitors say), or incrementalism (tweaking the current system). It captures the essential objective. It also gives you a practical test for every security decision. If you&#8217;re spending resources on the people-process-technology triad that don&#8217;t reduce the probability of a material cyber event, you&#8217;re wasting resources.</p><h1>Takeaway</h1><p>In these last four essays, I assumed you weren&#8217;t familiar with the idea of first principles. I explained what they are and told the stories of some of the big thinkers in human history (such as Euclid, Aristotle, Descartes, Whitehead &amp; Russell, and Elon Musk) who have used them to solve some of the thorniest problems known to humankind. I then noted that although in the early digital age, many big thinker computer scientists, such as James Anderson, Willis Ware, Bell and LaPadula, Saltzer and Schroeder, Dr. Fred Cohen, and Donn Parker, tried to find the edges of what cybersecurity meant but didn&#8217;t quite get there. The closest they came was something called the CIA triad, which is not really a first principle idea at all. I then made the case that other cybersecurity first principle candidates don&#8217;t really meet the bill either. Efficient patching, malware prevention, rapid detection and eradication, framework checklists like NIST or ISO, and even compliance law all fall short of what a first principle is supposed to be. They&#8217;re all good tactics that we might find useful, but they are not a coherent first principle strategy.</p><p>I then made my case for what I claim is the absolute cybersecurity first principle:</p><p style="text-align: center;">&#8220;Reduce the probability of a material cyber event over the next business cycle.&#8221;</p><p>There you have it. I&#8217;ve been thinking, debating, and writing about this idea for almost a decade, and it has gone through many versions. But I think this current iteration is as close as I&#8217;ve ever been to clearly stating what it is we are all trying to accomplish with our infosec programs.</p><p>That begs the question, what&#8217;s next? If reducing the probability of a material a cyber event is the thing we are trying to do, what are the follow-on first principle building blocks that we will install that will help us do that? Just like Whitehead and Russell, what are the essential concepts that will allow us to uniquely prove the equivalent of 1 + 1 = 2 in our network defender world?</p><p>In future essays, I will cover follow on strategies and tactics that logically follow from this first principle. Stay tuned.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p><h1>Source</h1><p>Rick Howard, 2023. <strong>Cybersecurity First Principles: A Reboot of Strategy and Tactics </strong>[2026 Canon Hall of Fame Book] </p><ul><li><p><strong><a href="https://cybercanon.org/cybersecurity-first-principles-a-reboot-of-strategy-and-tactics/">Canon Review URL</a></strong></p></li><li><p><strong><a href="https://amzn.to/4mI7QMU">Amazon Buy URL</a></strong></p></li><li><p><strong><a href="https://www.goodreads.com/book/show/75671183-cybersecurity-first-principles">Goodreads URL</a></strong></p></li></ul><p></p><h1>Resources</h1><p>Douglas Hubbard, Richard Seiersen, 2016. <strong>How to Measure Anything in Cybersecurity Risk</strong> [2018 Canon Hall of Fame Book].  </p><ul><li><p><a href="https://cybercanon.org/how-to-measure-anything-in-cybersecurity-risk/">Canon Review URL</a></p></li><li><p><a href="https://amzn.to/3JZ4ze1">Amazon Buy URL</a> </p></li><li><p><a href="https://www.goodreads.com/book/show/26518108-how-to-measure-anything-in-cybersecurity-risk">Goodreads URL</a> </p></li></ul><p>MATTHEW DALY, 2024. <strong>Supreme Court Chevron decision: What it means for federal regulations</strong> [Explainer]. AP News. URL https://apnews.com/article/supreme-court-chevron-regulations-environment-4ae73d5a79cabadff4da8f7e16669929 </p><p>Rick Howard, 2022. <strong>Cyber sand table series: OPM.</strong> [Podcast]. The CyberWire - CSO Perspectives Podcast. URL https://thecyberwire.com/stories/d0d8b9995bd84c389112385dd95ec4ee/cyber-sand-table-series-opm </p><p>Staff, 1999. <strong>SEC Staff Accounting Bulletin No. 99: Materiality</strong> [Bulletin]. SECURITIES AND EXCHANGE COMMISSION. URL https://www.sec.gov/interps/account/sab99.htm </p><p>Staff, 2020. <strong>Ransomware vicitim Travelex forced into bankruptcy</strong> [News]. Security Magazine. URL https://www.securitymagazine.com/articles/93062-ransomware-vicitim-travelex-forced-into-bankruptcy</p><p>The U.S. Supremet Court, 2023. <strong>22-451 Loper Bright Enterprises v. Raimondo (Chevron Doctrine)</strong> [Ruling]. Supreme Court of the United States. URL https://www.supremecourt.gov/opinions/23pdf/22-451_7m58.pdf </p><p>U.S. Securities and Exchange Commission, 2023. <strong>Final Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure</strong> [SEC Ruling] Securities Act Release No. 33&#8209;11216, Exchange Act Release No. 34&#8209;97989, 88 Fed. Reg. 51,896. URL https://www.sec.gov/files/rules/final/2023/33-11216.pdf </p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[The Cybersecurity Ballot]]></title><description><![CDATA[Meet the Perennial Candidates]]></description><link>https://diffuser.substack.com/p/the-cybersecurity-ballot</link><guid isPermaLink="false">https://diffuser.substack.com/p/the-cybersecurity-ballot</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 02 Mar 2026 13:03:15 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!MDCY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f175f96-33a9-49bd-bbbf-3b93ccafbfc0_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MDCY!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f175f96-33a9-49bd-bbbf-3b93ccafbfc0_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MDCY!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f175f96-33a9-49bd-bbbf-3b93ccafbfc0_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!MDCY!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f175f96-33a9-49bd-bbbf-3b93ccafbfc0_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!MDCY!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f175f96-33a9-49bd-bbbf-3b93ccafbfc0_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!MDCY!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f175f96-33a9-49bd-bbbf-3b93ccafbfc0_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MDCY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f175f96-33a9-49bd-bbbf-3b93ccafbfc0_1024x1536.png" width="364" height="546" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8f175f96-33a9-49bd-bbbf-3b93ccafbfc0_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:364,&quot;bytes&quot;:2865128,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/189511108?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f175f96-33a9-49bd-bbbf-3b93ccafbfc0_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MDCY!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f175f96-33a9-49bd-bbbf-3b93ccafbfc0_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!MDCY!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f175f96-33a9-49bd-bbbf-3b93ccafbfc0_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!MDCY!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f175f96-33a9-49bd-bbbf-3b93ccafbfc0_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!MDCY!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8f175f96-33a9-49bd-bbbf-3b93ccafbfc0_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>We&#8217;ve spent three decades refining tactics but we still haven&#8217;t agreed on the fundamental rule that governs all of it. </p><p>I&#8217;ve been thinking about first principles and what might be the cybersecurity first principle for over a decade. Three years ago, I even published a book about the topic.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.amazon.com/Cybersecurity-First-Principles-Strategy-Tactics-ebook/dp/B0C35HQFC3/ref=sr_1_1&quot;,&quot;text&quot;:&quot;Cybersecurity First Principles&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.amazon.com/Cybersecurity-First-Principles-Strategy-Tactics-ebook/dp/B0C35HQFC3/ref=sr_1_1"><span>Cybersecurity First Principles</span></a></p><p>Since then, I&#8217;ve been tightening my thinking. I haven&#8217;t changed my mind on the core concepts of the book. I&#8217;ve just gotten better at explaining them. To that end, I&#8217;ve published two essays refining my ideas:</p><ul><li><p><a href="https://diffuser.substack.com/p/first-principle-thinking">First Principle Thinking</a></p></li><li><p><a href="https://diffuser.substack.com/p/prior-research-on-cybersecurity-first">Prior Research on Cybersecurity First Principles</a></p></li></ul><p>I&#8217;m slowly working my way towards discussing what I think the absolute cybersecurity first principle is. But before I get there, it&#8217;s worth examining the best-practice strategies most of us have relied on for the past 30 years. These are the leading candidates for the title. They deserve scrutiny before any final claim is made.</p><h1>The Candidate List</h1><p>When I ask security professionals what they think is the atomic cybersecurity first principle, they usually respond with one or more items in a set of traditional cybersecurity best practices. Things like</p><ul><li><p>The CIA Triad</p></li><li><p>Vulnerability Management</p></li><li><p>Malware Prevention</p></li><li><p>Incident Response</p></li><li><p>Frameworks</p></li><li><p>Compliance</p></li></ul><p>But according to Caroline Wong, author of the Cybersecurity Canon Hall of Fame book <em>Security Metrics: A Beginner&#8217;s Guide</em>, the phrase &#8220;best practice&#8221; is misapplied by most network defenders.</p><blockquote><p>A best practice should refer to an approach or methodology that is understood to be more effective at delivering a particular outcome than any other technique when applied in a particular situation.</p></blockquote><p>She says that many accepted cybersecurity best practices, although good ideas, have not delivered on those outcomes.</p><p>I concur with Caroline. In my own career, I&#8217;ve built information security programs around these same best practices too. But after 30 years in the field, I have to admit something: I can&#8217;t say with any confidence that one best practice is substantially better than some other one. The general theme to all of them is that they all contribute value. But none of them, by themselves, are sufficient as the foundational principle on which to build an entire infosec program. Let&#8217;s take each one in turn.</p><h1>The CIA Triad</h1><p>The CIA acronym stands for Confidentiality, Integrity, and Availability and the CIA Triad is a general-purpose defensive model intended to apply across all contexts and threat types. But it says nothing about how adversaries actually operate. It doesn&#8217;t account for adversary tactics, techniques, or procedures. It doesn&#8217;t incorporate the behavior of the roughly 500 adversary campaigns active on the internet at any given time. If a strategy ignores how real attackers behave, how can it be the atomic first principle? The CIA Triad is not bad per se; it&#8217;s just not complete. </p><p>One thing to note: As of this writing, I estimate that the actual number of active adversary campaigns is between 250 and 700 depending on who is counting. I use the Tydal Cyber platform and the MITRE ATT&amp;CK Framework to get my range (Links in the Resource Section below). </p><p>Also, last year, I wrote a three-part series that explores the history, limitations, and potential replacements for the CIA Triad (Links in the Resource Section below). </p><h1>Vulnerability Management</h1><p>Vulnerability Management is similar. First, it&#8217;s a never-ending task. &#8220;I&#8217;ve patched all of our vulnerabilities&#8221; said nobody ever. More importantly, exploitation of vulnerabilities isn&#8217;t the biggest problem infosec practitioners face. The 2025 Verizon Data Breach Investigations Report (DBIR) notes that hackers use vulnerability exploitation as an initial access vector only 20% of the time. If patching is your first principle, what about the other 80% of attacks?</p><h1>Preventing Malware</h1><p>The equivalent argument applies to Preventing Malware. The same DBIR says hackers deploy malware in only 45% of breaches. If anti-malware is your first principle, what are you doing about the other 55% of attacks?</p><h1>Incident Response</h1><p>Incident response as a formal discipline emerged in the late 1980s. You could argue that Cliff Stoll pioneered the practical model when he tracked East German hackers working on behalf of Soviet intelligence; a story he documented in the Cybersecurity Canon Hall of Fame book <em>The Cuckoo&#8217;s Egg: Tracking a Spy Through the Maze of Computer Espionage</em>. But sometime in the 2010s, the infosec community started to pursue the idea that cyber defense is too hard and therefore should be abandoned in favor of incident response; abandon prevention mechanisms in favor of early detection mechanisms and efficient eradication systems. It turns out that this is also too hard to do mostly because it&#8217;s expensive. Small-to-medium-sized organizations can&#8217;t really afford to do it so they don&#8217;t. A true first principle must be universally applicable and not reserved for those with the largest budgets.</p><h1>Frameworks</h1><p>It&#8217;s tough to find a hard number, but there are likely dozens of cybersecurity frameworks globally; maybe as high as 50, depending on how you define &#8220;framework.&#8221; The number varies because there are many different kinds:</p><ul><li><p><strong>Governance Frameworks</strong>: Like ISACA&#8217;s COBIT; Control Objectives for Information and Related Technologies.</p></li><li><p><strong>Control Catalogs</strong>: Like the NIST Special Publication 800-53 (Revision 5<strong>)</strong>: Security and Privacy Controls for Information Systems and Organizations.</p></li><li><p><strong>Maturity Models</strong>: Like the U.S. Department of Defense&#8217;s Cybersecurity Maturity Model Certification (CMMC).</p></li><li><p><strong>Regulatory Schemas</strong>: Like the European Union&#8217;s General Data Protection Regulation (GDPR).</p></li><li><p><strong>Sector-Specific Standards</strong>: Like the North American Electric Reliability Corporation&#8217;s NERC Critical Infrastructure Protection Standards (NERC CIP)</p></li><li><p><strong>Regional Data Protection Regimes</strong>: Like the California Consumer Privacy Act (CCPA).</p></li><li><p><strong>Tickets to Ride (Compliance to gain access)</strong>: Like the U.S. General Services Administration (GSA) Federal Risk and Authorization Management Program (FedRAMP).</p></li></ul><p>From the very beginning, many security practitioners understood compliance regulations for what they are: attempts to establish baseline parameters of security and privacy programs. These same security practitioners view them as necessary evils to prevent fines (GDPR, for example) or as the price of doing business (FEDRAMP, for example). But they don&#8217;t view them as essential to protecting their organizations on the Internet. You have to follow them because they are requirements for some business need, but most don&#8217;t consider them fundamental to their security program and therefore can&#8217;t be the basis for any cybersecurity first principle program. Besides, for some organizations, it&#8217;s just easier to pay fines if they get caught as a cost of doing business. That doesn&#8217;t seem like a cybersecurity first principle.</p><h1>Takeaway</h1><p>The uncomfortable truth is this: cybersecurity doesn&#8217;t suffer from a lack of tools. It suffers from a lack of clarity. We keep refining mechanisms without agreeing on purpose. If these traditional best practices aren&#8217;t first principles, then we&#8217;ve been building programs on secondary assumptions for 30 years. That has consequences.</p><p>A first principle must be universal, irreducible, and explanatory. None of these candidates meet that bar. They are useful. They are necessary. But they are derivative.</p><p>So the real question isn&#8217;t which best practice should win the election. The real question is: what is the governing law of cybersecurity?</p><p>That&#8217;s where we go next.</p><h3></h3><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><p></p><h1>References</h1><p>Caroline Wong, 2011. <strong>Security Metrics, A Beginner&#8217;s Guide</strong> [Cybersecurity Canon Hall of Fame Book]. </p><ul><li><p>Goodreads URL <a href="https://www.goodreads.com/book/show/13654596-security-metrics-a-beginner-s-guide">https://www.goodreads.com/book/show/13654596-security-metrics-a-beginner-s-guide</a></p></li><li><p>Canon Review: <a href="https://cybercanon.org/security-metrics-a-beginners-guide/">https://cybercanon.org/security-metrics-a-beginners-guide/</a></p></li><li><p>Amazon Link: <a href="https://amzn.to/47FT1FA">https://amzn.to/47FT1FA</a></p></li></ul><p>Rick Howard, 2025. <strong>Part I: Is the CIA Triad Dead?: Why has the CIA Triad Endured?</strong> [Explainer]. Rick&#8217;s First Principles Newsletter. URL https://diffuser.substack.com/p/is-the-cia-triad-dead</p><p>Rick Howard, 2025. <strong>Part II: Is the CIA Triad Dead?</strong> [Explainer]. Rick&#8217;s First Principles Newsletter. URL https://diffuser.substack.com/p/is-the-cia-triad-dead-63c</p><p>Rick Howard, 2025. <strong>Part III: Is the CIA Triad Dead?</strong> [Explainer]. Rick&#8217;s First Principles Newsletter. URL https://diffuser.substack.com/p/part-iii-is-the-cia-triad-dead</p><p>Rick Howard, 2026. <strong>First Principle Thinking</strong> [Explainer]. Rick&#8217;s First Principles Newsletter. URL https://diffuser.substack.com/p/first-principle-thinking</p><p>Rick Howard, 2026. <strong>Prior Research on Cybersecurity First Principles</strong> [Explainer]. Rick&#8217;s First Principles Newsletter. URL https://diffuser.substack.com/p/prior-research-on-cybersecurity-first</p><p>Staff, n.d. <strong>Tidal Cyber</strong> [Dashboard]. Community Edition. URL https://app.tidalcyber.com/</p><p>Staff, n.d. <strong>MITRE ATT&amp;CK Framework</strong> [Wiki]. Mitre. URL https://attack.mitre.org/ </p>]]></content:encoded></item><item><title><![CDATA[The Men Robert Duvall Taught Me to Be ]]></title><description><![CDATA[Three performances that shaped my understanding of character, courage, and belief.]]></description><link>https://diffuser.substack.com/p/the-men-robert-duvall-taught-me-to</link><guid isPermaLink="false">https://diffuser.substack.com/p/the-men-robert-duvall-taught-me-to</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 23 Feb 2026 13:03:09 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!gayb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859040f6-39a7-4f85-9313-a64e083efdff_414x312.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!gayb!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859040f6-39a7-4f85-9313-a64e083efdff_414x312.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!gayb!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859040f6-39a7-4f85-9313-a64e083efdff_414x312.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gayb!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859040f6-39a7-4f85-9313-a64e083efdff_414x312.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gayb!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859040f6-39a7-4f85-9313-a64e083efdff_414x312.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gayb!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859040f6-39a7-4f85-9313-a64e083efdff_414x312.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!gayb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859040f6-39a7-4f85-9313-a64e083efdff_414x312.jpeg" width="414" height="312" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/859040f6-39a7-4f85-9313-a64e083efdff_414x312.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:312,&quot;width&quot;:414,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;RIP Robert Duvall. Gus McCrae will always be my personal favorite character  of his.&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="RIP Robert Duvall. Gus McCrae will always be my personal favorite character  of his." title="RIP Robert Duvall. Gus McCrae will always be my personal favorite character  of his." srcset="https://substackcdn.com/image/fetch/$s_!gayb!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859040f6-39a7-4f85-9313-a64e083efdff_414x312.jpeg 424w, https://substackcdn.com/image/fetch/$s_!gayb!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859040f6-39a7-4f85-9313-a64e083efdff_414x312.jpeg 848w, https://substackcdn.com/image/fetch/$s_!gayb!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859040f6-39a7-4f85-9313-a64e083efdff_414x312.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!gayb!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F859040f6-39a7-4f85-9313-a64e083efdff_414x312.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Robert Duvall passed away this week. He has been one of my favorite actors for as long as I can remember. The tributes I&#8217;ve read mostly highlight the performances he is best known for: <em>The Godfather I &amp; II</em>, where he brings calm intelligence to a world of chaos and violence; <em>Tender Mercies</em>, which earned him the Academy Award for Best Actor; and <em>Apocalypse Now</em>, with the unforgettable line, &#8220;I love the smell of napalm in the morning.&#8221;</p><p>But none of those are even in my top three.</p><h1>Lonesome Dove</h1><p>I first noticed Mr. Duvall when he starred in my dad&#8217;s favorite western, <em>Lonesome Dove</em>, in 1989. The series is set just after the Civil War, during the height of the great cattle drives from Texas to Montana. Duvall plays Captain Augustus &#8220;Gus&#8221; McCrae, a retired Texas Ranger and arguably one of the most charismatic characters ever to appear in a western. He knows the West is not a myth; hell, he helped tame it. Yet he still believes in love, beauty, conversation, good whiskey, and loyal friendship. And by god, Duvall plays the hell out of that character; probably gave the defining performance of his career in my humble opinion, <em>Tender Mercies</em> notwithstanding. And I&#8217;m pretty sure that my dad wanted to be Gus when he grew up. Now that I think about it, so do I.</p><h1>To Kill a Mockingbird</h1><p>But that&#8217;s not my favorite performance of his. It ranks only third on my list. The second best is Duvall&#8217;s turn as Boo Radley, early in his career, in 1962&#8217;s <em>To Kill a Mockingbird</em>. He has one line and is in the movie for only minutes right at the end. But wow, what an impact. His character looms in the background throughout the movie, never seen, just talked about, as the neighborhood boogeyman that the children fear. Then, after he saves Scout and Jem from a brutal attack, he steps out of the shadows. He is pale, quiet, shy, almost fragile; not a monster at all; just a gentle, wounded man. In that final scene, without theatrics and almost without words, Duvall lets the humanity pour through. The myth collapses. What remains is quiet goodness. I have watched that end-scene over a dozen times. It always brings tears to my eyes. Gregory Peck gets all the praise for his portrayal of Atticus Finch in this movie; a shiny heroic beacon in the dark of always doing the right thing. Duvall comes in at the end of the movie, playing a man that nobody knows, and brings the message home that anybody can do the right thing too.</p><h1>Secondhand Lions</h1><p>But my favorite Duvall performance comes out of a little seen movie called <em>Secondhand Lions</em><strong>. </strong>He plays Hub McCann, a retired, rumored-to-be-legendary adventurer who lives out his final years on a dilapidated Texas farm with his brother Garth (played by Michael Caine). Duvall gives a monologue about the meaning of life that is so powerful, so raw, that my wife and I rewatch the movie at least once a year. He&#8217;s an old timer and sleepwalks in the middle of the night; dreaming about his lost true love. When his nephew asks him about it, he delivers these lines:</p><p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!sK1g!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa55abddc-d1cd-4c05-9182-190043105148_882x636.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!sK1g!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa55abddc-d1cd-4c05-9182-190043105148_882x636.png 424w, https://substackcdn.com/image/fetch/$s_!sK1g!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa55abddc-d1cd-4c05-9182-190043105148_882x636.png 848w, https://substackcdn.com/image/fetch/$s_!sK1g!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa55abddc-d1cd-4c05-9182-190043105148_882x636.png 1272w, https://substackcdn.com/image/fetch/$s_!sK1g!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa55abddc-d1cd-4c05-9182-190043105148_882x636.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!sK1g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa55abddc-d1cd-4c05-9182-190043105148_882x636.png" width="882" height="636" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a55abddc-d1cd-4c05-9182-190043105148_882x636.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:636,&quot;width&quot;:882,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1084600,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/188576077?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa55abddc-d1cd-4c05-9182-190043105148_882x636.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!sK1g!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa55abddc-d1cd-4c05-9182-190043105148_882x636.png 424w, https://substackcdn.com/image/fetch/$s_!sK1g!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa55abddc-d1cd-4c05-9182-190043105148_882x636.png 848w, https://substackcdn.com/image/fetch/$s_!sK1g!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa55abddc-d1cd-4c05-9182-190043105148_882x636.png 1272w, https://substackcdn.com/image/fetch/$s_!sK1g!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa55abddc-d1cd-4c05-9182-190043105148_882x636.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><blockquote><p>A man should believe in those things, because those are the things worth believing in.</p></blockquote><p>I know that Tim McCanlies wrote the script and directed the movie, so he gets credit for the sentiment, but man, Duvall delivers it. An actor of a lesser caliber would have just made those lines sappy and unbelievable. </p><h1>Take Away</h1><p>Robert Duvall could play the mythic adventurer, the invisible protector, the weary consigliere, the broken singer, or the mad colonel and make each one feel completely real. He was that good of an actor. But what binds my three favorite performances together is that he made me believe that I was watching a man of real substance. Whether he was Gus McCrae laughing at death, Boo Radley standing silently in a doorway, or Hub McCann insisting that some things are worth believing in even when the world tells you otherwise, Duvall gave me examples of men that I could use as a north star in my own life&#8217;s journey.  I will be forever grateful for that.</p><p>Thank you Mr. Duvall and Godspeed on your next journey.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>References</h1><p></p><p>Robert Duvall and Haley Joel Osment. 2003. <strong>The Speech: Secondhand Lions</strong>. [Movie Clip] Youtube. URL: </p><div id="youtube2-y1-KbmIagFw" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;y1-KbmIagFw&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/y1-KbmIagFw?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>@tomalexander85, 2026. <strong>Robert Duvall&#8217;s Film Debut</strong> [Movie Clip]. YouTube. URL</p><div id="youtube2-YczRuKntbto" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;YczRuKntbto&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/YczRuKntbto?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Staff, 2024. <strong>Lonesome Dove | The Final Goodbye</strong> [Movie Clip]. FETV - YouTube. URL</p><div id="youtube2-EIc5S1gwRcg" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;EIc5S1gwRcg&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/EIc5S1gwRcg?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Bruce Beresford (Director), Robert Duvall (Actor), 1983. <strong>Tender Mercies</strong> [Movie]. Letterboxd. URL https://letterboxd.com/film/tender-mercies/ </p><p>Francis Ford Coppola (Direcetor), Robert Duvall (Actor), 1972. <strong>The Godfather</strong> [Movie]. Letterboxd. URL https://letterboxd.com/film/the-godfather/ </p><p>Francis Ford Coppola (Director), Robert Duvall (Actor), 1974. <strong>The Godfather Part II</strong> [Movie]. Letterboxd. URL https://letterboxd.com/film/the-godfather-part-ii/ </p><p>Francis Ford Coppola (Director), Robert Duvall (Actor), 1979. <strong>Apocalypse Now</strong> [Movie]. Letterboxd. URL https://letterboxd.com/film/apocalypse-now/ </p><p>Lewis John Carlino (Director), Robert Duvall (Actor), 1979. <strong>The Great Santini</strong> [<strong>Movie</strong>]. Letterboxd. URL https://letterboxd.com/film/the-great-santini/ </p><p>Robert Mulligan (Director), Robert Duvall (Actor), Gregory Peck (Actor), 1962. <strong>To Kill a Mockingbird</strong> [Movie]. Letterboxd. URL https://letterboxd.com/film/to-kill-a-mockingbird/ </p><p>Simon Wincer (Director), Larry McMurtry (Writer), William D. Wittliff (Writer), Robert Duvall (Actor), Tommy Lee Jones (Actor), 1989. <strong>Lonesome Dove</strong> [TV Mini-Series]. IMDb. URL https://www.imdb.com/title/tt0096639/ </p><p>Staff, 2026. <strong>Films starring Robert Duvall</strong> [List]. Letterboxd. URL https://letterboxd.com/actor/robert-duvall/</p><p>Tim McCanlies (Writer and Director), Robert Duvall (Actor), Sir Michael Caine (Actor), 2003. <strong>Secondhand Lions</strong> [Movie]. Letterboxd. URL https://letterboxd.com/film/secondhand-lions/ </p><p>Staff, 2018. <strong>Top 10 Robert Duvall Roles</strong> [Video]. WatchMojo - YouTube. URL</p><div id="youtube2-XPCvuRcQhF4" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;XPCvuRcQhF4&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/XPCvuRcQhF4?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[What's an American]]></title><description><![CDATA[From Lincoln to Bridge of Spies: The Character Test of Citizenship]]></description><link>https://diffuser.substack.com/p/whats-an-american</link><guid isPermaLink="false">https://diffuser.substack.com/p/whats-an-american</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 16 Feb 2026 13:01:54 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!HXbR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce761722-d6d0-4067-bb6b-8033343acecf_705x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!HXbR!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce761722-d6d0-4067-bb6b-8033343acecf_705x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!HXbR!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce761722-d6d0-4067-bb6b-8033343acecf_705x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HXbR!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce761722-d6d0-4067-bb6b-8033343acecf_705x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HXbR!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce761722-d6d0-4067-bb6b-8033343acecf_705x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HXbR!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce761722-d6d0-4067-bb6b-8033343acecf_705x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!HXbR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce761722-d6d0-4067-bb6b-8033343acecf_705x1000.jpeg" width="705" height="1000" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ce761722-d6d0-4067-bb6b-8033343acecf_705x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:705,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Amazon.com: Bridge of Spies [DVD] [2015] : Tom Hanks: Movies &amp; TV&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Amazon.com: Bridge of Spies [DVD] [2015] : Tom Hanks: Movies &amp; TV" title="Amazon.com: Bridge of Spies [DVD] [2015] : Tom Hanks: Movies &amp; TV" srcset="https://substackcdn.com/image/fetch/$s_!HXbR!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce761722-d6d0-4067-bb6b-8033343acecf_705x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!HXbR!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce761722-d6d0-4067-bb6b-8033343acecf_705x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!HXbR!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce761722-d6d0-4067-bb6b-8033343acecf_705x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!HXbR!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fce761722-d6d0-4067-bb6b-8033343acecf_705x1000.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>As the United States continues its descent into chaos and anarchy, I&#8217;ve been soothing my soul watching movies where the protagonists exude character; a trait that our country&#8217;s leadership seems to be in short supply. Movies like</p><ul><li><p><em>Superman</em>, when Lois says, &#8220;You trust everyone and think everyone you&#8217;ve ever met is beautiful.&#8221; And Superman says &#8220;Well, maybe that&#8217;s the new punk rock.&#8221;</p></li><li><p><em>The American President,</em> when Michael Douglas, speaking to the press, says &#8220;And I can tell you without hesitation that being President of this country is entirely about Character.&#8221;</p></li><li><p><em>Lincoln</em>: The entire damn movie</p></li></ul><p>But the movie that really moved me lately was <em>A Bridge of Spies</em>, written by Joel and Ethan Coen and directed by Steven Spielberg. It stars Tom Hanks playing an insurance lawyer who the courts appoint to defend a suspected Russian Spy. The CIA wants Hanks to tell them what his client is saying, violating client-attorney privilege. Hanks take umbrage with the suggestion and explains in simple terms, what it means to be an American. Hanks says, </p><blockquote><p>&#8220;Your Agent Hoffman right? German Extraction? </p><p>My names Donovan, Irish, both sides, mother and father. </p><p>I&#8217;m Irish, your German,  but what makes us both Americans? </p><p>Just one thing. One &#8230; One, One. </p><p>The rule book. We call it the Constitution. </p><p>And we agree to the rules. And that&#8217;s what makes us Americans. </p><p>It&#8217;s all that makes us Americans.</p></blockquote><p>Well, when you put it like that, being an American is pretty simple. It&#8217;s not about the color of your skin or where you came from. It&#8217;s not about your assigned race or ethnic ancestry. If your an American citizen, the thing that connects you to all the other American citizens is the law, the set of rules embodied in the <em>U.S. Constitution</em> and philosophically grounded in the <em>Declaration of Independence.</em></p><blockquote><p>We hold these truths to be self-evident, that all men are created equal.</p></blockquote><p>Or, if you want a more folksy version of that idea, how about the song lyrics  from  <em>In America</em> by The Charlie Daniels Band:</p><p></p><blockquote><p>From The Sound up in Long Island</p><p>Out to San Francisco Bay</p><p>And everything that&#8217;s in between them is our own</p><p>And we may have done a little bit</p><p>Of fighting among ourselves</p><p>But you outside people best leave us alone</p><p>&#8216;Cause we&#8217;ll all stick together</p><p>And you can take that to the bank</p><p>That&#8217;s the cowboys and the hippies</p><p>And the rebels and the yanks</p><p>You just go and lay your hand</p><p>On a Pittsburgh Steelers fan</p><p>And I think you&#8217;re gonna finally understand</p></blockquote><p>I fear we&#8217;ve forgotten that sentiment.</p><p>If America is a contract, then breaking the rules doesn&#8217;t just break laws. It breaks the country.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>References</h1><p>Willoughby Alley, 2016. <strong>What Makes Us Americans</strong> [WWW Document]. Bridge Of Spies Clip - YouTube. URL</p><div id="youtube2-D2gLGW9w8Hk" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;D2gLGW9w8Hk&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/D2gLGW9w8Hk?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Steven Spielberg (Director), Tom Hanks (Actor), 2015. <strong>Bridge of Spies</strong>  [Movie]. Letterboxd. URL https://letterboxd.com/film/bridge-of-spies/</p><p>Rob Reiner (Director), Aaron Sorkin (Writer), Michael Douglas (Actor), 1995. <strong>The American President</strong>  [Movie]. Letterboxd. URL https://letterboxd.com/film/the-american-president/ </p><p>Lee Hoedl, 2020. <strong>The American President - The Final Speech</strong> [Movie Clip]. YouTube. URL</p><div id="youtube2--__djIQgBJc" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;-__djIQgBJc&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/-__djIQgBJc?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Staff, 1776. <strong>Declaration of Independence: A Transcription</strong> [Founding Document]. National Archives. URL https://www.archives.gov/founding-docs/declaration-transcript</p><p>Staff, 1787. The Constitution of the United States: A Transcription [WWW Document]. National Archives. URL https://www.archives.gov/founding-docs/constitution-transcript (accessed 2.15.26).</p><p></p><p>Charlie Daniels, 2001. In America - The Charlie Daniels Band&nbsp; [Music Video]. YouTube. URL</p><div id="youtube2-Hm4_rXQAyLM" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;Hm4_rXQAyLM&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/Hm4_rXQAyLM?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>JayAye, 2025. <strong>Maybe that&#8217;s the Real Punk Rock</strong> [Movie Clip]. Superman 2025 - YouTube. URL</p><div id="youtube2-07rO705t_7w" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;07rO705t_7w&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/07rO705t_7w?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>James Gunn (Writer and Director, David Corenswet (Actor), Rachel Brosnahan (Actor), 2025. <strong>Superman</strong> [Movie]. Letterboxd. URL https://letterboxd.com/film/superman-2025/ </p><p></p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div>]]></content:encoded></item><item><title><![CDATA[Dracula Goes West]]></title><description><![CDATA[I picked this up expecting genre comfort food. I finished it thinking about complicity, silence, and moral failure.]]></description><link>https://diffuser.substack.com/p/dracula-goes-west</link><guid isPermaLink="false">https://diffuser.substack.com/p/dracula-goes-west</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 09 Feb 2026 13:01:30 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Shpm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5d312e1-0677-4843-ac66-af5bd7d829e4_1000x1500.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Shpm!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5d312e1-0677-4843-ac66-af5bd7d829e4_1000x1500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Shpm!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5d312e1-0677-4843-ac66-af5bd7d829e4_1000x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Shpm!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5d312e1-0677-4843-ac66-af5bd7d829e4_1000x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Shpm!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5d312e1-0677-4843-ac66-af5bd7d829e4_1000x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Shpm!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5d312e1-0677-4843-ac66-af5bd7d829e4_1000x1500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Shpm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5d312e1-0677-4843-ac66-af5bd7d829e4_1000x1500.jpeg" width="236" height="354" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/e5d312e1-0677-4843-ac66-af5bd7d829e4_1000x1500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1500,&quot;width&quot;:1000,&quot;resizeWidth&quot;:236,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Shpm!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5d312e1-0677-4843-ac66-af5bd7d829e4_1000x1500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Shpm!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5d312e1-0677-4843-ac66-af5bd7d829e4_1000x1500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Shpm!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5d312e1-0677-4843-ac66-af5bd7d829e4_1000x1500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Shpm!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fe5d312e1-0677-4843-ac66-af5bd7d829e4_1000x1500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I love me a good vampire story. This one has been on many &#8220;must read&#8221; lists of late. I read a previous work by this author, Stephen Graham Jones, and liked it. His <em>The Only Good Indians</em> was a unique, funny, and heartbreaking ghost story that I read right at the beginning of the pandemic, so I thought I would give this one a try.</p><p><em>The Buffalo Hunter Hunter</em> combines the epistolary dread of Bram Stoker&#8217;s <em>Dracula</em> and the confessional intimacy of Anne Rice&#8217;s <em>Interview with the Vampire</em>. The result is a narrative that channels the historic trauma of America&#8217;s First Peoples, the enduring rage born of genocide, and a long-delayed, fantastical reckoning.</p><p>It begins in 2012, when Etsy Beaucarne, a modern-day academic, discovers a journal within a wall of an old parsonage in Montana. The journal&#8217;s author, a Lutheran pastor named Arthur Beaucarne, Etsy&#8217;s great-grandfather, wrote it in 1912. It&#8217;s a confessional transcript about Arthur&#8217;s encounter with a mysterious Blackfeet man known as Good Stab. </p><h1>[Spoilers]</h1><p>Good Stab approaches the pastor under the guise of a spiritual confession, but what he offers is a brutal history rooted in colonial violence and genocide. The kicker, though, is that Good Stab claims he&#8217;s a vampire. A violent encounter with a grotesque creature (called &#8220;Cat Man&#8221;) cursed him with immortality and a thirst for blood. But really, Good Stab is there to perform a reckoning against Arthur for his complicity in the slaughter of an Indian village. Arthur was not a buffalo hunter, not a soldier, and not a vigilante. His sin was witnessing the massacre without intervening. Arthur is a proxy for all white people who stood inside the American culture that eradicated Good Stab&#8217;s people and did nothing. This is a story about complicity, silence, theology, and moral failure.</p><p>Jones has created a genuinely original vampire story, and I appreciate the ambition. It opens strong and ends even stronger, though I felt the middle sagged a bit. Still, the method for killing a vampire in this world is completely fresh, and I loved it. In Jones&#8217;s mythology, vampires gradually take on the characteristics of whatever they feed on; too many white victims and they begin to resemble white people; too many from a particular Indigenous tribe and they start to mirror that tribe; too many fish and they literally become more fish-like. At that point, vampire hunting becomes less about stakes and more about dietary planning. That trait has enormous implications when you&#8217;re trying to figure out how to dispatch one.</p><p>I read a lot of vampire books. I know, it&#8217;s a sickness. I keep track of my top 10 favorites. <em>The Buffalo Hunter Hunter</em> debuts at number nine for me and bumps off one of my old time favorites.</p><h1>My Revised Top 10 Books</h1><ol><li><p><em>Salem&#8217;s Lot</em> by Stephen King</p></li><li><p><em>Vampire$</em> by John Steakley</p></li><li><p><em>The Kolchak Papers</em> by Jeff Rice</p></li><li><p><em>Interview with a Vampire</em> by Anne Rice</p></li><li><p><em>Dracula</em> by Bram Stoker</p></li><li><p><em>Let the Right One</em> <em>In</em> by John Ajvide Lindqvist</p></li><li><p><em>The Southern Book Club&#8217;s Guide to Slaying Vampires</em> by Grady Hendrix</p></li><li><p><em>The Lesser Dead</em> by Christopher Buehlman</p></li><li><p><em>The Buffalo Hunter Hunter</em> by Stephen Graham Jones</p></li><li><p><em>Nightwatch</em> by Sergei Lukyanenko</p></li></ol><p>Bumped off the list: <em>Guilty Pleasures</em> by Laurel Hamilton</p><p>This isn&#8217;t a perfect book. The middle stretches a bit. But the ambition, originality, and ending more than earn their keep. Jones takes vampire lore seriously enough to break it, rebuild it, and use it for something meaningful. If you&#8217;re a fan of <em>Dracula</em> or <em>Interview with the Vampire</em>, you&#8217;ll recognize the lineage immediately. And if you care about what genre fiction can do at its best, this one deserves a spot on your shelf.</p><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Source</h1><p>Stephen Graham Jones, 2025. <strong>The Buffalo Hunter Hunter</strong> [Novel]. Narrated by  Shane Ghostkeeper, Marin Ireland, and Owen Teale. Goodreads. URL <a href="https://www.goodreads.com/book/show/214565614-the-buffalo-hunter-hunter">https://www.goodreads.com/book/show/214565614-the-buffalo-hunter-hunter</a></p><h1>References</h1><p>Anne Rice, 1976. <strong>Interview with the Vampire</strong> [Novel]. Goodreads. URL <a href="https://www.goodreads.com/book/show/43763.Interview_with_the_Vampire">https://www.goodreads.com/book/show/43763.Interview_with_the_Vampire</a></p><p>Bram Stoker, 1897. <strong>Dracula</strong> [Novel]. Project Gutenberg . URL https://www.gutenberg.org/cache/epub/345/pg345-images.html</p><p>Christopher Buehlman, 2014. <strong>The Lesser Dead</strong> [Novel]. Goodreads. URL https://www.goodreads.com/book/show/20893407-the-lesser-dead</p><p>Grady Hendrix, 2020. <strong>The Southern Book Club&#8217;s Guide to Slaying Vampires</strong> [Novel]. Goodreads. URL https://www.goodreads.com/book/show/44074800-the-southern-book-club-s-guide-to-slaying-vampires</p><p>Jeff Rice, 2007. <strong>The Kolchak Papers</strong> [Novel]. Goodreads. URL https://www.goodreads.com/book/show/996660.The_Kolchak_Papers </p><p>John Ajvide Lindqvist, 2004. <strong>Let the Right One In</strong> [Novel]. Goodreads. URL https://www.goodreads.com/book/show/943402.Let_the_Right_One_In</p><p>John Steakley, 1990. <strong>Vampire$</strong> [Novel]. Goodreads. URL https://www.goodreads.com/book/show/843588.Vampire_ </p><p>Sergei Lukyanenko, 1998. <strong>The Nightwatch</strong> [Novel]. Goodreads. URL https://www.goodreads.com/book/show/222118811-the-nightwatch</p><p>Stephen Graham Jones, 2020. <strong>The Only Good Indians</strong> [Novel]. Goodreads. URL <a href="https://www.goodreads.com/book/show/52180399-the-only-good-indians">https://www.goodreads.com/book/show/52180399-the-only-good-indians</a></p><p>Stephen King, 1975. <strong>&#8217;Salem&#8217;s Lot</strong> [Novel]. Goodreads. URL https://www.goodreads.com/book/show/11590._Salem_s_Lot</p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Running Through Washington, D.C. With Dan Brown]]></title><description><![CDATA[Freemasons, monuments, midnight tours, and why The Lost Symbol feels like a home-field thriller]]></description><link>https://diffuser.substack.com/p/running-through-washington-dc-with</link><guid isPermaLink="false">https://diffuser.substack.com/p/running-through-washington-dc-with</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 02 Feb 2026 13:01:28 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!S8Pa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58224023-6c06-4bda-8972-f670557196d9_314x475.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!S8Pa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58224023-6c06-4bda-8972-f670557196d9_314x475.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!S8Pa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58224023-6c06-4bda-8972-f670557196d9_314x475.jpeg 424w, https://substackcdn.com/image/fetch/$s_!S8Pa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58224023-6c06-4bda-8972-f670557196d9_314x475.jpeg 848w, https://substackcdn.com/image/fetch/$s_!S8Pa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58224023-6c06-4bda-8972-f670557196d9_314x475.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!S8Pa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58224023-6c06-4bda-8972-f670557196d9_314x475.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!S8Pa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58224023-6c06-4bda-8972-f670557196d9_314x475.jpeg" width="314" height="475" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/58224023-6c06-4bda-8972-f670557196d9_314x475.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:475,&quot;width&quot;:314,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!S8Pa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58224023-6c06-4bda-8972-f670557196d9_314x475.jpeg 424w, https://substackcdn.com/image/fetch/$s_!S8Pa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58224023-6c06-4bda-8972-f670557196d9_314x475.jpeg 848w, https://substackcdn.com/image/fetch/$s_!S8Pa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58224023-6c06-4bda-8972-f670557196d9_314x475.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!S8Pa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F58224023-6c06-4bda-8972-f670557196d9_314x475.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>What if the most unrealistic thing in <em>The Lost Symbol</em> isn&#8217;t the Freemasons, but the fact that anyone in Washington, D.C. had the energy for a midnight monument tour after nearly dying?</p><p>You don&#8217;t read a Dan Brown novel (and watch his popular movies) for nuanced character development or strict realism. At least I don&#8217;t. I consume it for the entertaining puzzles that the main character, Robert Langdon (think Tom Hanks in the movies), has to solve and Brown&#8217;s talent for weaving conspiracy theories out of real-world facts mixed with imaginative speculation. In his first three books, there&#8217;s always an umbrella conspiracy theory that glues everything together.</p><p>In the 2000 novel <em>Angels &amp; Demons</em>, Brown portrays leaders of the Catholic Church suppressing science in order to preserve their power. In <em>The Da Vinci Code (2003)</em>, the central conspiracy is the claim that the Holy Grail is not an object, but a living bloodline descended from Mary Magdalene.  In this book, <em>The Lost Symbol (2009)</em>, Brown argues that some prominent U.S. Founding Fathers, most notably George Washington and Benjamin Franklin, were Freemasons who believed in the &#8220;Ancient Mysteries,&#8221; including human apotheosis (the elevation of a person to their highest potential through enlightenment and discipline), and that the Masons deliberately concealed this knowledge to prevent its misuse.</p><p>For me though, the best part of <em>The Lost Symbol </em>is that Brown sets the story in Washington D.C., my home town (technically, I live in the suburbs, just south of the beltway but close enough). The story mostly orbits the good guys chasing the bad guy (or vice versa) to fantastic places in and around Washington D.C.: </p><ul><li><p>The United States Capitol Building plus the Capitol Crypt and the Apotheosis painting inside.</p></li><li><p>The Smithsonian Museum Support Center (SMSC)</p></li><li><p>Freedom Plaza</p></li><li><p>The Washington National Cathedral</p></li><li><p>The Washington Monument</p></li><li><p>The House of the Temple</p></li><li><p>The George Washington Masonic Memorial</p></li></ul><p>My two main knocks on the novel are number one, all the characters are one-dimensional, including Robert Langdon. Number two, the plot is incoherent if you bother to think about it for more than a second. </p><p>The bad guy, a young malcontent who inherits a vat of money, turns himself into a muscle-bound, full-body-occult-tattoo-covered Freemason, becomes an expert in the occult, and starts acquiring ancient totems like Indiana Jones because he has daddy issues. He traverses the Freemason hierarchy all the way to the 33d degree (because his dad did it) in an infiltration effort to discover the secrets of the Ancient Mysteries and to become one with the universe. He did this with the ingenious method of sneaking a camera into the Freemason secret meetings hidden in his wig. Diabolical! </p><p>And, after the the good guys win, the father, after his son amputated his hand, and Robert Langdon, who the bad guy temporarily drowned, took the time to conduct a midnight tour of the Washington Monument to make a philosophical point. If it was me, I would at least have taken a nap before the tour, or maybe grabbed a sandwich or something.</p><p>But, like I said, the plot isn&#8217;t the reason I read a Dan Brown book. Even though <em>The Lost Symbol</em> is an an occult thriller, a civic love letter to Washington, D.C., and a New Age manifesto all rolled into one, I came for the conspiracies, the puzzles, and the added bonus that the story occurs in my backyard. I liked it. Three stars.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Source</h1><p>Dan Brown, 2009. <strong>The Lost Symbol (Robert Langdon, #3)</strong> [Novel]. Goodreads. URL https://www.goodreads.com/book/show/6411961-the-lost-symbol</p><h1>References </h1><p>Dan Brown, 2000. <strong>Angels &amp; Demons (Robert Langdon, #1)</strong> [Novel]. Goodreads. URL <a href="https://www.goodreads.com/book/show/960.Angels_Demons">https://www.goodreads.com/book/show/960.Angels_Demons</a></p><p>Dan Brown, 2003. <strong>The Da Vinci Code (Robert Langdon, #2)</strong> [Novel]. Goodreads. URL <a href="https://www.goodreads.com/book/show/55019161-the-da-vinci-code">https://www.goodreads.com/book/show/55019161-the-da-vinci-code</a></p><p>Janet Masline, 2009. <strong>&#8216;The Lost Symbol&#8217; by Dan Brown: Baddies and Brainiacs and the Secrets of Freemasonry</strong> [Review]. The New York Times. URL <a href="https://www.nytimes.com/2009/09/14/books/14maslin.html">https://www.nytimes.com/2009/09/14/books/14maslin.html</a></p><p>Maureen Dowd, 2009. <strong>Capital Secrets</strong> [Review]. The New York Times. URL <a href="https://www.nytimes.com/2009/10/11/books/review/Dowd-t.html">https://www.nytimes.com/2009/10/11/books/review/Dowd-t.html</a></p><p>Rick Howard, 2003 (Updated in 2019). <strong>daVinci</strong> [Google Sheets Book Summary - The Da Vinci Code] URL: https://docs.google.com/presentation/d/1JF7DIs6G6kKX6cqfMoWyWThO39iGMR3Bo6gXbDS5guQ/edit?usp=sharing</p><p>Ron Howard (Director). Tom Hanks, Ian McKellen, Paul Bettany, and Alfred Molina (actors). 2006. <strong>The Da Vinci Code</strong> [Movie]. Letterboxd. URL <a href="https://letterboxd.com/film/the-da-vinci-code/">https://letterboxd.com/film/the-da-vinci-code/</a></p><p>Ron Howard (Director). Tom Hanks, Ewan McGregor (Actors). 2009. <strong>Angels &amp; Demons</strong> [Movie]. Letterboxd. URL <a href="https://letterboxd.com/film/angels-demons/">https://letterboxd.com/film/angels-demons/</a></p><p>Staff, 2024. <strong>The Lost Symbol</strong> [Fan Site]. All about Dan Brown -. URL <a href="https://allaboutdanbrown.com/the-lost-symbol/">https://allaboutdanbrown.com/the-lost-symbol/</a></p>]]></content:encoded></item><item><title><![CDATA[Why I Bounced Hard Off A Wrinkle in Time]]></title><description><![CDATA[I didn&#8217;t expect A Wrinkle in Time to fail a basic parental sanity check, but it did.]]></description><link>https://diffuser.substack.com/p/why-i-bounced-hard-off-a-wrinkle</link><guid isPermaLink="false">https://diffuser.substack.com/p/why-i-bounced-hard-off-a-wrinkle</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 26 Jan 2026 13:04:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!v4aa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7955fd1-2140-4239-8af4-40d9a6683335_676x1000.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!v4aa!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7955fd1-2140-4239-8af4-40d9a6683335_676x1000.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!v4aa!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7955fd1-2140-4239-8af4-40d9a6683335_676x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!v4aa!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7955fd1-2140-4239-8af4-40d9a6683335_676x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!v4aa!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7955fd1-2140-4239-8af4-40d9a6683335_676x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!v4aa!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7955fd1-2140-4239-8af4-40d9a6683335_676x1000.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!v4aa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7955fd1-2140-4239-8af4-40d9a6683335_676x1000.jpeg" width="676" height="1000" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a7955fd1-2140-4239-8af4-40d9a6683335_676x1000.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1000,&quot;width&quot;:676,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:&quot;Amazon.com: A Wrinkle in Time: (Newbery Medal Winner) eBook : L'Engle,  Madeleine: Kindle Store&quot;,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Amazon.com: A Wrinkle in Time: (Newbery Medal Winner) eBook : L'Engle,  Madeleine: Kindle Store" title="Amazon.com: A Wrinkle in Time: (Newbery Medal Winner) eBook : L'Engle,  Madeleine: Kindle Store" srcset="https://substackcdn.com/image/fetch/$s_!v4aa!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7955fd1-2140-4239-8af4-40d9a6683335_676x1000.jpeg 424w, https://substackcdn.com/image/fetch/$s_!v4aa!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7955fd1-2140-4239-8af4-40d9a6683335_676x1000.jpeg 848w, https://substackcdn.com/image/fetch/$s_!v4aa!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7955fd1-2140-4239-8af4-40d9a6683335_676x1000.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!v4aa!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa7955fd1-2140-4239-8af4-40d9a6683335_676x1000.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><p>I didn&#8217;t expect <em>A Wrinkle in Time</em> to fail a basic parental sanity check, but it did. </p><p>In the Apple TV series <em>Ted Lasso</em>, Trent Crimm ( The Independent) gives a Twitter Line book review of <em>A Wrinkle in Time</em>. He says, &#8220;it&#8217;s the story of a young girl&#8217;s struggle with the burden of leadership as she journeys through space.&#8221; I don&#8217;t know what book Trent Crimm was reading, but it wasn&#8217;t the one I read. </p><p>I wasn&#8217;t expecting a sci-fi&#8211;fantasy fairy tale. Science fiction, yes. Fantasy, maybe. But a fairy tale in which immortal beings, after failing for centuries to defeat a great evil, send underage children to confront it, armed with nothing more than a pair of magic glasses and a few words of encouragement, fully aware that the children have little chance of success and a high probability of dying? And then, after barely escaping for their lives with a rescued dad in tow, the dad turns around and sends his daughter back in by herself to fetch her stupid brother?</p><p>Uh ... I don&#8217;t think so. I can see why kids might like the story but &#8220;my&#8221; dad-hat was sitting firmly on my head and there is no way that I&#8217;m sending my daughter out by herself to face the ultimate evil. No parent would. I don&#8217;t know what I was expecting but I know it wasn&#8217;t that and I didn&#8217;t like it. </p><p>I did appreciate that L&#8217;Engle published it in the early 1960s and her ideas were ahead of their time. Back then, science fiction readers consumed stories about adults dismantling societies through intellect and ideology (<em>Stranger in a Strange Land</em>), mathematicians predicting civilizations (<em>Foundation</em>), and adults grappling with power, ethics, and technology (<em>A Canticle for Leibowitz</em>). <em>A Wrinkle in Time</em> is written in the language of science with children interacting and understanding tesseracts, relativity, higher dimensions, and psychological control. And she just expects her audience to go with it. I liked that part.</p><p>Back then, we were still feeling the impact of fighting off a totalitarian system (Nazis in WWII) and were worried about another one (Stalinism). Nuclear annihilation was plausible and imminent. George Orwell&#8217;s <em>1984</em>, published in 1949, was on everybody&#8217;s mind in the West, and there was a real fear that we might slide into a similar dystopia  The great evil in this book represented totalitarianism, mind-numbing conformity, and no freedom of thought. L&#8217;Engle was saying that this is something to defeat by all means, like we did with the Nazis;  even sending your daughter in alone is justified. I think many parents reading it for the first time like I did, would bounce off that idea hard. </p><p>But many people love this book. It did win three literary awards:</p><ul><li><p>Newbery Medal (1963)</p></li><li><p>Sequoyah Book Award (1965)</p></li><li><p>Lewis Carroll Shelf Award (1965)</p></li></ul><p>Clearly, many readers see something here that I don&#8217;t. But for me, two stars. It had some good parts but not enough for me to recommend it. </p><p>As a fairy tale, I guess <em>A Wrinkle in Time</em> works. As a story I&#8217;d trust with my kids though, it leaves me uneasy and that&#8217;s not nothing.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Source</h1><p>Madeleine L&#8217;Engle, 1962. <strong>A Wrinkle in Time</strong> [Book]. Read by Hope Davis, Ava DuVernay, Madeleine L&#8217;Engle, and Charlotte Jones Coiklis. Goodreads. URL https://www.goodreads.com/book/show/33574273-a-wrinkle-in-time </p>]]></content:encoded></item><item><title><![CDATA[Prior Research on Cybersecurity First Principles]]></title><description><![CDATA[We&#8217;ve published thousands of security frameworks, built millions of security tools, and certified entire generations of professionals, but breaches never stopped rising.]]></description><link>https://diffuser.substack.com/p/prior-research-on-cybersecurity-first</link><guid isPermaLink="false">https://diffuser.substack.com/p/prior-research-on-cybersecurity-first</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 19 Jan 2026 13:11:18 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!DGaI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F364429a4-753b-45f7-865b-c2c601158638_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!DGaI!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F364429a4-753b-45f7-865b-c2c601158638_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!DGaI!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F364429a4-753b-45f7-865b-c2c601158638_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!DGaI!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F364429a4-753b-45f7-865b-c2c601158638_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!DGaI!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F364429a4-753b-45f7-865b-c2c601158638_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!DGaI!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F364429a4-753b-45f7-865b-c2c601158638_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!DGaI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F364429a4-753b-45f7-865b-c2c601158638_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/364429a4-753b-45f7-865b-c2c601158638_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:2987951,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/184949482?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F364429a4-753b-45f7-865b-c2c601158638_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!DGaI!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F364429a4-753b-45f7-865b-c2c601158638_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!DGaI!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F364429a4-753b-45f7-865b-c2c601158638_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!DGaI!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F364429a4-753b-45f7-865b-c2c601158638_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!DGaI!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F364429a4-753b-45f7-865b-c2c601158638_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>In the modern world, the computer era started in earnest when the mainframe computer became useful to governments, universities, and the commercial world (circa 1960&#8211;1981). It took about a decade before the mainframe community realized that they might have a computer security problem and it started with the U.S. military. Willis Ware&#8217;s <em>Security Controls For Computer Systems</em>, published in 1970 when Ware was working for the Rand Corporation, started the process. The paper is not so much a definition of cybersecurity as it is a listing and description of all the ways computers were going to be a problem in the future when they started sharing resources across networks. I would put this in the category of, &#8220;the first step in solving any problem is recognizing that you have a problem.&#8221;</p><h1>Early Derivative Thinking</h1><p>Attempts to solve the problem didn&#8217;t start with first principle thinking. Thought leaders in the space pursued derivative thinking; specifically analogy at first (This looks like X, so I&#8217;ll do something similar.) Digital systems look kind of similar to physical systems (like buildings), so let&#8217;s just adopt physical security ideas to our digital environments. That&#8217;s what Ware&#8217;s paper recommends: the security community needs to determine how to build a secure digital system. That idea became the focus of researchers through the 1990s. In the Cybersecurity Canon Hall of Fame book, <em>A Vulnerable System: The History of Information Security in the Computer Age</em>, published in 2021, the author, Andrew Stewart, laments the fact that since the beginning of the digital age, nobody has been able to build a secure system. Today, this idea has largely been abandoned. But back then, it was driving all the thinking.</p><h5>James Anderson</h5><p>The paper <em>Computer Security Technology Planning Study</em>, published by James Anderson for the U.S. Air Force in 1972, feels like a continuation of thought from the Willis Ware paper.</p><p>This is more derivative thinking in the form of Incrementalism (Take the current system and improve it slightly). Now that Ware identified the problem, Anderson was thinking through ways to solve it. He may be the first to suggest the idea that security shouldn&#8217;t be added on after the system is built, something that security professionals still talk about today when you hear them discuss the idea of shifting left or security by design. Anderson accepts Ware&#8217;s idea that building a secure system is the ultimate goal but proposes that any secure systems will require a way to monitor that system for defects and intrusions.</p><h5>Bell and LaPadula</h5><p>The next year, David Bell and Len LaPadula, then working for MITRE, published their paper called <em>Secure Computer Systems: Mathematical Foundations</em>. In it, they provide the arithmetic proof that would guarantee that a computer system is secure (More incrementalism). Unfortunately, they admit up front that even if you could build a system that adheres to the proof, how would system builders guarantee that they implemented everything correctly? Theoretically, you could do it, but practically, how would you vouch for the veracity? And this is the problem that plagued this kind of research for 30 years.</p><h5>Saltzer and Schroeder</h5><p>In 1975, Jerome Saltzer and Michael Schroeder published their paper, <em>The Protection of Information in Computer Systems</em>,&#8221; in <em>Proceedings of the IEEE</em>. In it, they lay out the early beginnings of the CIA triad, even though they don&#8217;t use that exact terminology. This is more derivative thinking but this time in the form of Precedent (How has this been done before?). Confidentiality and Integrity are ideas taken from the physical paper world of protecting sensitive information. Availability is a new but adjacent idea, a nod to the nature of digital environments. How do you ensure that the digital system is always up and running?</p><p>Saltzer and Schroeder also likely make the first case that username/password combinations are a weak form of authentication and two-factor authentication will be required. They were among the first to argue that security mechanisms should be as simple as possible (complexity kills) and that their effectiveness should not depend on secrecy of the design (security through obscurity). Finally, they promote an idea called <em>fail-safe defaults</em>, meaning deny everything first and allow by exception. This idea anticipates what later became known as perimeter defense, in which a defined system boundary is established to regulate access. This was about a decade before we had the technology to do it (firewalls). It also sounds very much like what turned out to be <em>Zero Trust</em> some 35 years later.</p><h5>Fred Cohen</h5><p>Dr. Fred Cohen published the first papers in 1991 and 1992 that used Defense-in-Depth to describe a common cybersecurity model in the network defender community.  This is more derivative thinking in the form of incrementalism trying to build a secure system. He didn&#8217;t invent the phrase, Defense-in-Depth, but he is most likely the first one to describe it in a paper.</p><p>Defense-in-Depth is the idea that network architects erect an electronic barrier that sits between the Internet and an organization&#8217;s digital assets. To get on the inside of the barrier from the Internet, you had to go through a control point (usually a firewall but sometimes in the early days, with a router). From the 1990s until present day, the common practice has been to add additional control tools behind the firewall to provide more granular functions. In the early days, we added intrusion detection systems and antivirus systems. All of those tools together formed something called the <em>security stack</em>, and the idea was that if one of the tools in the stack failed to block an adversary, then the next tool in line would. If that one failed, then the next would take over. That is defense in depth.</p><h5>John McCumber</h5><p>In 1991, John McCumber published <em>Information Systems Security: A Comprehensive Model</em> at the 14th Annual National Computer Security Conference (NCSC). He doesn&#8217;t coin the phrase <em>CIA Triad</em> in the paper but he does say that the three elements are a triad (more derivative incrementalism). As near as I can tell, this is the origin story of the phrase.</p><h5>Donn Parker</h5><p>In 1998, Donn Parker published his book <em>Fighting Computer Crime: A New Framework for Protecting Information</em>, where he strongly condemns the elements in the CIA triad as being inadequate. He never mentions the phrase &#8220;CIA triad,&#8221; though. He proposed adding three other elements (possession or control, authenticity, and utility; more incrementalism) that eventually became known as the Parkerian Hexad, but the idea never really caught on for reasons probably only a marketing expert could explain. Notice that Parker is still using derivative thinking here, not first principle thinking, even though he thinks we haven&#8217;t solved the problem yet.</p><h5>(ISC)&#178;</h5><p>In 1997, (ISC)&#178; codified their Common Body of Knowledge (CBK); a formal taxonomy of knowledge domains designed for the cybersecurity profession and the conceptual foundation for (ISC)&#178; certifications, most notably the CISSP (Certified Information Systems Security Professional). At the time, people in the industry were desperate to show their qualifications in this brand new field and we all flocked to get the CISSP certification. CISSP exam questions started using the <em>CIA Triad</em> phrase sometime around the 1998&#8211;1999 exam cycle and certification seekers had to recognize and correctly use the term &#8220;CIA Triad&#8221; to pass. And that is how a derivative idea becomes an industry standard.</p><h1>Clouds Change the Derivative Thinking Game</h1><p>In the 2000s, most security practitioners spent time improving the security stack in one form or the other. As cloud environments emerged around 2006, the number of digital environments we had to protect exploded. Organizations started storing and processing data in multiple locations that I like to call <em>Data Islands</em> (traditional data centers, mobile devices, cloud environments, and SaaS applications). The security stack idea became more abstract. It wasn&#8217;t one set of tools physically deployed behind the firewall any longer; it was a series of security stacks deployed for each data island. In an incremental way, the security stack became the set of all tools deployed that improved the organization&#8217;s defensive posture regardless of where they were located. This is <em>Defense-in-Depth</em> applied abstractly to all of the environments. Most of the research in this period focused on improving our <em>CIA Triad</em> capability by building better tools for the security stack such as application firewalls, identity and access management systems, XDR, etc.</p><h1>First Principle Thinking Emerges</h1><p>First principle thinking didn&#8217;t appear until the 2010s when researchers started to realize that the community&#8217;s derivative thinking wasn&#8217;t really solving the problem. A cluster of influential works appeared that challenged prevailing assumptions and implicitly grappled with foundational ideas, including John Kindervag&#8217;s <em>Zero Trust: No More Chewy Centers</em> (2010), Lockheed Martin&#8217;s <em>Intrusion Kill Chain Prevention</em> model (2010), the United States Department of Defense&#8217;s <em>Diamond Model</em> (2011), and the MITRE Corporation&#8217;s <em>ATT&amp;CK Framework</em> (2013).</p><p>I&#8217;m not sure exactly when I heard about the two mathematicians (Whitehead and Russel) who rebuilt the language of math from the ground up using first principles, but it started me thinking and writing about cybersecurity first principles as early as 2016. That new cluster of ideas mentioned above hadn&#8217;t really caught on yet in the community. My own thoughts weren&#8217;t fully formed yet either, but even then, I knew that the security practitioner community was going in the wrong direction. We had somehow chosen, in a groupthink kind of way, that securing individual systems with the <em>CIA Triad</em> was the way to go. And yet, the number of reported breaches continued to grow. I knew even then that the <em>CIA Triad</em> wasn&#8217;t elemental enough to solve the problem originally articulated by Ware in the 1970s. We are all thinking too tactically. We didn&#8217;t need to secure individual computer systems. At this point, we knew it was impossible to do anywat. We needed something else. It was clear to me that we needed to get back to first principles.</p><p>In 2017, Dr. Matthew Hale, Dr. Robin Gandhi, and Dr. Briana Morrison turned toward first principle thinking in their <em>Introduction to Cybersecurity First Principles</em> designed for elementary students (K-12). They declare that cybersecurity is a design problem and just stipulate 10 cybersecurity first principles that they cribbed from the NSA without any question as to why these 10 are the most atomic notions in cybersecurity. In 2021, Dr. John Sands, Susan Sands, and Jaime Mahoney, from Brookdale Community College, cover the same material with more detail but again don&#8217;t offer any argument about why these are first principles, just that they are.</p><p>Shouhuai Xu published his paper <em>The Cybersecurity Dynamics Way of Thinking and Landscape</em> at the 7th ACM Workshop on Moving Target Defense in 2020. Xu proposes a three-dimensional axis with first principles modeling analysis (assumption driven), data analytics (experiment driven), and metrics (application and semantics driven). But again, there is no discussion of why his first principles are elemental.</p><p>Nicholas Seeley published his master&#8217;s thesis at the University of Idaho in 2021: <em>Finding the Beginning to Discover the End: Power System Protection as a Means to Find the First Principles of Cybersecurity</em>. Out of all the papers reviewed here, this is the most complete in terms of first principle thinking. Seeley reviewed most of the papers I have referenced here before he drew any conclusions. He makes the case that the main ideas that emerge from those papers revolve around the issue of trust. He then questions whether the idea of trust is fundamental enough to be a first principle. He quotes James Coleman and his book <em>The Foundations of Social Theory </em> that says &#8220;situations that involve trust are a subset of situations that involve risk.&#8221; Or, as Seeley says, &#8220;without risk there is no need for trust.&#8221; Seeley says that risk is a function of probability, a measure of uncertainty. He believes that uncertainty is more fundamental than the <em>CIA Triad</em> or any of the other analytical checklists that the previous authors came up with. Interestingly, the father of decision analysis theory, Dr. Ron Howard, says the same thing in his book <em>The Foundations of Decision Analysis</em>.</p><p>Seeley takes an idea from the Luhmann/King/Morgner book <em>Trust and Power</em> that trust allows us to reduce complexity in our lives. He then proposes a set of assumptions (postulates or axioms), similar to Euclid, that are his set of cybersecurity first principles.</p><ul><li><p>Complete knowledge of a system is unobtainable; therefore, uncertainty will always exist in our understanding of that system.</p></li><li><p>The principal of a system must invest trust in one or more agents.</p></li><li><p>Known risks can be mitigated using controls, transference, and avoidance, else the risks must be accepted.</p></li><li><p>Unknown risks manifest through complexity.</p></li></ul><p>But then he stops short of identifying the absolute cybersecurity first principle and uses his axioms to design a better proof than Bell and LaPadula to decide if one system design over another is more secure using eigenvalue analysis of the associated graphs. In other words, he went back to the traditional well of trying to design secure systems.</p><h1>Take Away</h1><p>A review of the prior research demonstrates that cybersecurity did not evolve from first-principles reasoning, but rather from a long sequence of derivative approaches shaped by analogy, precedent, and incremental improvement. Early foundational work by Ware, Anderson, Bell and LaPadula, and Saltzer and Schroeder correctly identified the emergence of computer security as a systemic problem and focused the field on the goal of building secure systems. However, those efforts largely assumed that security could be achieved through improved system design, formal proofs, and increasingly sophisticated control mechanisms; an assumption that proved untenable as systems became more complex, interconnected, and economically constrained.</p><p>As the discipline matured, the <em>CIA Triad</em> emerged as the dominant organizing heuristic, reinforced through frameworks, professional certifications, and tooling ecosystems; the de facto cybersecurity first principal so to speak. Despite repeated critiques and attempts to refine or expand it, the triad remained fundamentally system-centric. Subsequent models, such as <em>Zero Trust</em> architectures and <em>Intrusion Kill Chain Prevention</em> frameworks challenged the status quo, but they did not redefine the foundational objective of cybersecurity. Instead, they optimized tactics within an inherited conceptual structure.</p><p>Explicit discussions of cybersecurity first principles did not meaningfully appear until the late 2010s. Even then, most efforts either asserted principles without justifying their elemental nature or retreated back to the traditional goal of designing secure systems. Of the works reviewed, Seeley&#8217;s 2021 thesis comes closest to a true first-principles analysis by grounding cybersecurity in uncertainty and risk, yet it ultimately stops short of identifying an irreducible, outcome-oriented principle and instead re-enters the secure-systems paradigm.</p><p>Taken together, the literature reveals a discipline that recognized its problems early, refined its tools continuously, but rarely questioned its foundational assumptions. While the language of first principles has appeared sporadically, cybersecurity has lacked a unifying, atomic principle from which strategy, tactics, measurement, and governance can be logically derived. </p><p>Next week, we will discuss candidates for the ultimate cybersecurity first principle.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Resources</h1><p>Andrew J. Stewart, 2021. A Vulnerable System: The History of Information Security in the Computer Age [Canon Hall of Fame Candidate]. Goodreads. URL: <a href="https://www.goodreads.com/book/show/57645492-a-vulnerable-system">https://www.goodreads.com/book/show/57645492-a-vulnerable-system</a>. Canon URL: <a href="https://cybercanon.org/a-vulnerable-system-the-history-of-information-security-in-the-computer-age/">https://cybercanon.org/a-vulnerable-system-the-history-of-information-security-in-the-computer-age/</a>.</p><p>Blake E. Strom, Andy Applebaum, Doug P. Miller, Kathryn C. Nickels, Adam G. Pennington, Cody B. Thomas, 2018. MITRE ATT&amp;CK: Design and Philosophy [White Paper]. MITRE. URL <a href="https://www.mitre.org/sites/default/files/publications/pr-18-0944-11-mitre-attack-design-and-philosophy.pdf">https://www.mitre.org/sites/default/files/publications/pr-18-0944-11-mitre-attack-design-and-philosophy.pdf</a></p><p>David Bell and Len LaPadula, 1973. SECURE COMPUTER SYSTEMS: MATHEMATICAL FOUNDATIONS [Paper] URL: <a href="https://websites.umich.edu/~cja/LPS12b/refs/belllapadula1.pdf">https://websites.umich.edu/~cja/LPS12b/refs/belllapadula1.pdf</a></p><p>Donn Parker, 1983, updated 1998. Fighting Computer Crime: A New Framework for Protecting Information [Book]. Goodreads. URL <a href="https://www.goodreads.com/book/show/605372.Fighting_Computer_Crime">https://www.goodreads.com/book/show/605372.Fighting_Computer_Crime</a></p><p>Dr. Matthew L. Hale, Dr. Robin Gandhi,  Dr. Briana B. Morrison, 2021. Introduction to Cybersecurity First Principles [Web Framework]. Nebraska GenCyber. URL <a href="https://mlhale.github.io/nebraska-gencyber-modules/intro_to_first_principles/README/">https://mlhale.github.io/nebraska-gencyber-modules/intro_to_first_principles/README/</a></p><p>Eric Hutchins, Michael Cloppert, Rohan Amin, 2010. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains [White Paper]. Lockheed Martin Corporation. URL <a href="https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf">https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf</a></p><p>Fred Cohen, 1989. Models of practical defenses against computer viruses [White Paper] Computers &amp; security, 149&#8211;160. URL: <a href="https://www.semanticscholar.org/paper/Models-of-practical-defenses-against-computer-Cohen/d3640a7d245ee1042ec3f3308b0f1747dfdbfea4">https://www.semanticscholar.org/paper/Models-of-practical-defenses-against-computer-Cohen/d3640a7d245ee1042ec3f3308b0f1747dfdbfea4</a></p><p>Fred Cohen, 1992. Defense-in-depth against computer viruses [White Paper] Computers and Security 11, 563&#8211;579. URL: <a href="https://www.semanticscholar.org/paper/Defense-in-depth-against-computer-viruses-Cohen/0332710ef0a81c48f694180a5164bf027e4dd4ba">https://www.semanticscholar.org/paper/Defense-in-depth-against-computer-viruses-Cohen/0332710ef0a81c48f694180a5164bf027e4dd4ba</a></p><p>James Anderson, Eldred Nelson, Melvin Conway, Bruce Peters, Daniel Edwards, Charles Rose, Hilda Faust, Clark Weissman, Steven Lipner, October 1972, Computer Security Technology Planning Study, Volume 1 - Executive Summary [Contracted Research Paper] US Air Force Information Systems Technology Division (Command and Management Systems) - Computer Security Resource Center - NIST. URL <a href="https://csrc.nist.gov/files/pubs/conference/1998/10/08/proceedings-of-the-21st-nissc-1998/final/docs/early-cs-papers/ande72a.pdf">https://csrc.nist.gov/files/pubs/conference/1998/10/08/proceedings-of-the-21st-nissc-1998/final/docs/early-cs-papers/ande72a.pdf</a></p><p>James Samuel Coleman, 1998. Foundations of Social Theory [Book]. Goodreads. URL <a href="https://www.goodreads.com/book/show/236795.Foundations_of_Social_Theory">https://www.goodreads.com/book/show/236795.Foundations_of_Social_Theory</a></p><p>JEROME H. SALTZER, MICHAEL D. SCHROEDER, 1975. The Protection of Information in Computer Systems [Journal Article]. Fourth ACM Symposium on Operating System Principles (October 1973). Manuscript received October 11, 1974; revised April 17. 1975. Communications of the ACM, University of Virginia. URL <a href="http://www.cs.virginia.edu/~evans/cs551/saltzer/">www.cs.virginia.edu/~evans/cs551/saltzer/</a>.</p><p>John Kindervag, 2010. No More Chewy Centers: Introducing The Zero Trust Model Of Information Security [White Paper]. Palo Alto Networks. URL <a href="https://media.paloaltonetworks.com/documents/Forrester-No-More-Chewy-Centers.pdf">https://media.paloaltonetworks.com/documents/Forrester-No-More-Chewy-Centers.pdf</a></p><p>John R. McCumber, October 1991. Information Systems Security: A Comprehensive Model [Proceedings] 14th Annual National Computer Security Conference (NCSC), National Institute of Standards and Technology (NIST) / National Computer Security Center (NCSC), Baltimore, Maryland, 1&#8211;4 October 1991, pp. 328&#8211;337. URL <a href="https://people.cs.georgetown.edu/~clay/classes/spring2009/555/papers/McCumber91.pdf">https://people.cs.georgetown.edu/~clay/classes/spring2009/555/papers/McCumber91.pdf</a></p><p>Nicholas Seeley, 20 December 2021. Finding the Beginning to Discover the End: Power System Protection as a Means to Find the First Principles of Cybersecurity [White Paper] URL: <a href="https://objects.lib.uidaho.edu/etd/pdf/Seeley_idaho_0089N_12228.pdf">https://objects.lib.uidaho.edu/etd/pdf/Seeley_idaho_0089N_12228.pdf</a></p><p>Niklas Luhmann, 1982. Trust and Power [Book. Goodreads. URL <a href="https://www.goodreads.com/book/show/733259.Trust_and_Power">https://www.goodreads.com/book/show/733259.Trust_and_Power</a></p><p>PI Mike Qaissaunee (NCYTE), Dr. John Sands and Susan Sands (Moraine Valley Community College), Jaime Mahoney (Bunker Hill Community College), n.d. Cybersecurity Principles [Interactive lesson]. NCyTE Center. URL <a href="https://www.ncyte.net/academia/faculty/cybersecurity-curriculum/college-curriculum/interactive-lessons/cybersecurity-principles">https://www.ncyte.net/academia/faculty/cybersecurity-curriculum/college-curriculum/interactive-lessons/cybersecurity-principles</a></p><p>Rick Howard, 2025. Part I: Is the CIA Triad Dead?: Why has the CIA Triad Endured? [Analysis]. Rick&#8217;s First Principles Newsletter. URL <a href="https://diffuser.substack.com/p/is-the-cia-triad-dead">https://diffuser.substack.com/p/is-the-cia-triad-dead</a></p><p>Rick Howard, 2026. First Principle Thinking [Explainer]. Rick&#8217;s First Principles Newsletter. URL <a href="https://diffuser.substack.com/p/first-principle-thinking">https://diffuser.substack.com/p/first-principle-thinking</a></p><p>Ronald A. Howard, Ali Abbas, 2013. Foundations of Decision Analysis [Book]. Goodreads. URL <a href="https://www.goodreads.com/book/show/14794158-foundations-of-decision-analysis">https://www.goodreads.com/book/show/14794158-foundations-of-decision-analysis</a></p><p>Sergio Caltagirone, Andrew Pendergast, Christopher Betz, 2011. The Diamond Model of Intrusion Analysis. Center for Cyber Threat Intelligence and Threat Research [White Paper]. https://www.activeresponse.org/. URL <a href="https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf">https://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf</a></p><p>Shouhuai Xu, 2020. The Cybersecurity Dynamics Way of Thinking and Landscape [White Paper]. Proceedings of the 7th ACM Workshop on Moving Target Defense, Pages 69 - 80 . URL <a href="https://dlnext.acm.org/doi/10.1145/3411496.3421225">https://dlnext.acm.org/doi/10.1145/3411496.3421225</a></p><p>Willis H. Ware et al, 11 February 1970. The Ware Report: SECURITY CONTROLS FOR COMPUTER SYSTEMS (U): Report of Defense Science Board [Study] Defense Science Board - Task Force on Computer System Security - The Rand Corporation - Computer Security Resource Center - NIST. URL: <a href="https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/ware70.pdf">https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/ware70.pdf</a></p><p></p><p></p><p></p><p></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[First Principle Thinking]]></title><description><![CDATA[For first principles must not be derived from one another nor from anything else, while everything has to be derived from them.]]></description><link>https://diffuser.substack.com/p/first-principle-thinking</link><guid isPermaLink="false">https://diffuser.substack.com/p/first-principle-thinking</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Tue, 13 Jan 2026 01:11:07 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!71IC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cfef4ae-672b-4835-b14d-304bd687d001_1024x1536.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!71IC!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cfef4ae-672b-4835-b14d-304bd687d001_1024x1536.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!71IC!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cfef4ae-672b-4835-b14d-304bd687d001_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!71IC!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cfef4ae-672b-4835-b14d-304bd687d001_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!71IC!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cfef4ae-672b-4835-b14d-304bd687d001_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!71IC!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cfef4ae-672b-4835-b14d-304bd687d001_1024x1536.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!71IC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cfef4ae-672b-4835-b14d-304bd687d001_1024x1536.png" width="1024" height="1536" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/0cfef4ae-672b-4835-b14d-304bd687d001_1024x1536.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1536,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:3212008,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://diffuser.substack.com/i/184367104?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cfef4ae-672b-4835-b14d-304bd687d001_1024x1536.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!71IC!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cfef4ae-672b-4835-b14d-304bd687d001_1024x1536.png 424w, https://substackcdn.com/image/fetch/$s_!71IC!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cfef4ae-672b-4835-b14d-304bd687d001_1024x1536.png 848w, https://substackcdn.com/image/fetch/$s_!71IC!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cfef4ae-672b-4835-b14d-304bd687d001_1024x1536.png 1272w, https://substackcdn.com/image/fetch/$s_!71IC!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F0cfef4ae-672b-4835-b14d-304bd687d001_1024x1536.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p></p><blockquote><p>For first principles must not be derived from one another nor from anything else, while everything has to be derived from them.</p><p>&#8212;Aristotle, philosopher</p></blockquote><blockquote><p>&#8230;in order to study the acquisition of [knowledge], we must commence with the investigation of those first causes which are called Principles.</p><p>&#8212;Rene Descartes, philosopher</p></blockquote><blockquote><p>I think it&#8217;s important to reason from first principles rather than by analogy&#8230;. [With first principles] you boil things down to the most fundamental truths&#8230;and then reason up from there.</p><p>&#8212;Elon Musk, SpaceX founder</p></blockquote><h1>How Do People Solve Problems?</h1><p>Most people don&#8217;t start from first principles. They start with derivative thinking. When I have a problem to solve, I generally look around to see if anybody else has solved it already and steal their work (Hey - don&#8217;t judge me. The goal is to get the job done, not produce original work.) If there are no available solutions, then I look around for solutions to problems that are related to mine, not exactly identical but in the same ballpark, and then I steal that solution. Sometimes, the community has produced standards or the government has passed compliance laws that dictate what I should do. If that&#8217;s the case, then that&#8217;s an easy steal. And sometimes, I&#8217;m not looking for a new solution at all. I&#8217;m just interested in improving the existing system a little bit.</p><p>To simplify, for known solutions to common problems or, if you like, derivative thinking, you generally have four choices.</p><ul><li><p>Precedent (How has this been done before?)</p></li><li><p>Analogy (This looks like X, so I&#8217;ll do something similar.)</p></li><li><p>Authority (What do experts / standards / competitors do?)</p></li><li><p>Incrementalism (Take the current system and improve it slightly.)</p></li></ul><p>If I&#8217;m trying to learn how to scramble an egg, it&#8217;s easy enough to find a YouTube video of Gordon Ramsey showing how he does it (Precedent). If I&#8217;m trying to scramble an ostrich egg, Ramsey&#8217;s video will probably be good enough (Analogy). If I&#8217;m scrambling an egg for a new diner I&#8217;m opening in my home state of Virginia, then the Virginia Administrative Code (12VAC5&#8209;421: Food Regulations, Chapter 421) probably has something to say in the matter (Authority). And if I just want to make my scrambled egg more fluffy in the morning, Ramsey&#8217;s advanced class on breakfast meals can help me there (Incrementalism).</p><h1>No Workable Solution for Cybersecurity</h1><p>For cybersecurity though, from the very beginning, vendors and governments have provided a recommended solution set since the late 1970s.  I&#8217;ve been in the industry for over 30 years and, for all the advances made in that period (1990s until today), cyber bad guys are still remarkably successful. Here&#8217;s what I mean.</p><p>Even though it&#8217;s tough to calculate real numbers between the good old days of the 1990s (since we didn&#8217;t keep track of them that well) and today, we can do some back-of-the-envelope calculations about the estimated annual monetary loss attributable to cyber attacks on public companies. Adjusting for inflation, I estimate that in the 1990s, the loss was between $80m and $150m dollars (USD) worldwide. In the 2020s, I estimate the range to be between $15 billion and $20 billion. That&#8217;s at least a 100X increase depending on how you count it.</p><p>When viewed through that lens, the solutions pursued by the infosec community do not appear to be effective. My peers and I have relied on precedent, analogy, authority, and incremental improvement, yet none of these approaches has eliminated the problem.</p><p>If there is no known solution set that stops cyber bad guys from being successful, maybe we haven&#8217;t identified the correct problem that we are all trying to solve. Maybe, we&#8217;ve simply tackled symptoms of the problem, like</p><ul><li><p>Vulnerability management to patch buggy software.</p></li><li><p>Red teaming to find unknown design flaws in our networks.</p></li><li><p>Incident response to formalize how to react to crisis moments.</p></li><li><p>and lots of other things.</p></li></ul><p>But as I said, cyber bad guys still have amazing success. I have to say, after a full career in cybersecurity, that&#8217;s disconcerting.</p><h1>First Principle Thinking</h1><p>First-principle thinking is a different way to solve problems. Rather than looking at what&#8217;s been done before and taking the next step, you first reduce the problem to irreducible truths and build up from there. Contrary to accepting assumptions, conventions, analogies, or best practices, you ask what must be true at the lowest possible level and what can be logically derived from that foundation. It&#8217;s problem solving 101. While you&#8217;re breaking the problem into smaller bits, ignore any previous assumptions or best practices that have constrained past solutions. The difference between the two approaches then is that derivative reasoning optimizes within existing frameworks and first-principle thinking questions whether those frameworks are valid at all. And that&#8217;s what I&#8217;m proposing here. I&#8217;m pretty sure our cybersecurity derivative thinking over the last 30 years isn&#8217;t valid.</p><h1>Origin of First Principle Thinking</h1><p>The idea of first principles goes all the way back to the great philosopher Aristotle (384&#8211;322 BCE) in his published work <em>Physics</em> (about 340 BCE), where he established his initial concepts of natural philosophy, the study of nature (<em>physis</em>). Before he starts his main thesis, though, he establishes that we can&#8217;t really understand a concept completely until we understand its essence:</p><blockquote><p>For we do not think that we know a thing,</p><p>until we are acquainted with its primary conditions or first principles,</p><p>and have carried our analysis as far as its simplest elements.<sup> </sup></p></blockquote><p>He describes his method for finding these primary conditions by taking what we think we know from casual observation and working our way back to the core of it. He says,</p><blockquote><p>The natural way of doing this</p><p>is to start from the things which are more knowable and obvious to us</p><p>and proceed towards those which are clearer and more knowable by nature.</p></blockquote><p>He makes it clear, though, that these indivisible explanatory causes, we would call them atomic ideas today, are unique building blocks, and all study starts there.</p><blockquote><p>For first principles must not be derived from one another</p><p>nor from anything else,</p><p>while everything has to be derived from them.</p></blockquote><p>Once you find these essential concepts, they are the &#8220;big bang&#8221; to the overall hypothesis.</p><blockquote><p>First principles are eternal and have no ulterior cause.</p></blockquote><h1>A Sampling of First Principle Thinkers in History</h1><p>Euclid, the ancient Greek mathematician, never mentions &#8220;first principles&#8221; in his foundational math book <em>Elements</em> (~300 BCE). But, his sparse presentation of 23 definitions, five assumptions (postulates or axioms), and five common notions has been the underlying bedrock of geometry and other math disciplines for more than 23 centuries. His book is a clear demonstration of how first-principle reasoning can produce long lasting coherent systems with extraordinary explanatory power. As President Lincoln said about Euclid in the 2012 movie,</p><blockquote><p>&#8220;[They are rules] of mathematical reasoning. [They&#8217;re] true because [they] work. Has done and always will do. In his book, Euclid says that this is self-evident.&#8221; </p></blockquote><p>In 1644, Ren&#233; Descartes, the greatest philosophical doubter of all time, and the father of modern philosophy, published Principles of Philosophy. He begins by outlining the essence of philosophical thinking:</p><blockquote><p>&#8230; the word PHILOSOPHY signifies the study of wisdom,</p><p>and that by wisdom is to be understood,</p><p>not merely prudence in the management of affairs,</p><p>but a perfect knowledge of all that man can know,</p><p>as well for the conduct of his life,</p><p>as for the preservation of his health,</p><p>and the discovery of all the arts.</p></blockquote><p>Now that&#8217;s a gigantic research goal. How would you ever pursue it? He says, to procure that understanding, we must infer it from initial sources.</p><blockquote><p>To subserve these ends, must necessarily be deduced from first causes;</p><p>so that in order to study the acquisition of it (which is properly called philosophizing),</p><p>we must commence with the investigation of those first causes,</p><p>which are called PRINCIPLES.</p></blockquote><p>He then says that these first principles must meet two requirements.</p><blockquote><p>In the first place, they must be so clear and evident</p><p>that the human mind,</p><p>when it attentively considers them,</p><p>cannot doubt of their truth;</p><p>in the second place, the knowledge of other things</p><p>must be so dependent on them</p><p>as that though the principles themselves</p><p>may indeed be known apart from</p><p>what depends on them.</p></blockquote><p>What he means is that all knowledge about the subject comes from these first principles.</p><blockquote><p>It will accordingly be necessary thereafter to endeavor so</p><p>to deduce from those principles</p><p>the knowledge of the things that depend on them,</p><p>as that there may be nothing in the whole series of deductions</p><p>which is not perfectly manifest.</p></blockquote><p>One thing to note here is that finding first principles for any subject is hard. It requires us to willingly discard accepted best practices and think deeply about what is fundamental. It means we are questioning the status quo and have to be willing, in public, to be considered crazy for long periods. First Principle thinking challenges authority, invalidates sunk costs, and threatens professional identity. It breaks standards and frameworks and requires saying &#8220;everyone before us was wrong.&#8221;</p><p>With his book, Descartes completely upended the current philosophical thinking of the day saying that Aristotle and his contemporaries (Plato and Socrates) never found the first principle of philosophy. Ouch! Descartes&#8217; approach, by doubting everything, established the ultimate first principle of philosophy:</p><blockquote><p>&#8220;I think, therefore I am (Cogito, ergo sum).</p></blockquote><p>Two British mathematicians, Alfred Whitehead and Bertrand Russell, published a book, <em>Principia Mathematica</em>, in 1910, that attempted to rebuild the language of math from the ground up using a small set of first principles.   They recognized some inconsistencies in the current set of rules used by the math community at the time. You could use the same rules to get two different and absolutely correct results, something called the Russell paradox. In a precision engineering world, that was a recipe for disaster. So, they went back to the drawing board, threw everything out, and started from scratch. It took them 80 pages to mathematically prove that 1 + 1 = 2. In a footnote, Whitehead and Russell famously wrote this line:</p><blockquote><p>The above proposition is occasionally useful.</p></blockquote><p>And you all thought that math nerds weren&#8217;t funny. Shame on you.</p><h1>Modern Day First Principle Thinkers</h1><p>In our modern day, when asked about how he approached the concepts of economic space flights, Elon Musk didn&#8217;t say that he looked at what NASA and Boeing had done during the Apollo and Space Shuttle missions in the 1960s and 1970s and took the next step. Instead, he threw all of that out and started over with first principles; a gutsy move for sure but that&#8217;s probably why he is a gazillionaire, and I&#8217;m not.  </p><p>In the last 30 years, there are many other examples where upstart businesses or new cybersecurity strategy thought leaders completely changed the world by identifying the atomic first principle in their associated problem domains. Here are just a few:</p><ul><li><p>1995: Jeff Bezos (Amazon Store): Real time logistics vs real estate ownership.</p></li><li><p>1999: Marc Benioff (Salesforce): Software as a Service (leased) vs software ownership.</p></li><li><p>2006: Jeff Bezos (Amazon Cloud): Infrastructure (compute and storage) as a service vs ownership.</p></li><li><p>2007: Steve Jobs (Apple iPhone): Handheld devices are computers that make phone calls vs mobile phones that have some computer capability.</p></li><li><p>2010: Reed Hastings (Netflix): On-demand movie viewing flexibility vs appointment TV.</p></li><li><p>2010: John Kindervag (Zero Trust): Continuously verify entities and access permissions vs trusting everybody and everything inside the perimeter.</p></li><li><p>2010: Eric Hutchins, Michael Cloppert, and Rohan Amin (Intrusion Kill Chain Prevention): Deploy prevention and detection controls for specific known adversaries vs generic controls that might apply to any adversary. <br>2012: Elon Musk (Tesla): Electric cars need ubiquitous power stations vs longer battery life.</p></li></ul><p>Note the two cybersecurity entries in that list, the white papers from Kindervag on Zero Trust and from Hutchins, Cloppert, and Amin on Intrusion Kill Chains. Yes, even cybersecurity nerds can be first principle thinkers. I will note however, that even these game changer ideas (Zero Trust and Intrusion Kill Chain Prevention) didn&#8217;t solve the problem. The monetary cost still skyrocketed.</p><h1>Take Away</h1><p>If we accept monetary loss as a rough but meaningful signal, the conclusion is uncomfortable: despite decades of investment, frameworks, standards, tools, and expertise, cybersecurity outcomes have worsened, not improved. Adjusted for inflation, losses have increased by orders of magnitude. That alone should force us to question whether we are solving the right problem at all.</p><p>For thirty years, the infosec community, including me, has relied almost exclusively on derivative thinking. We borrowed what worked elsewhere, followed authority, complied with standards, optimized existing systems, and incrementally improved controls. That approach works well when the underlying model is sound. But when the model itself is wrong, incremental improvement simply entrenches failure more efficiently.</p><p>First-principle thinkers throughout history did not accept persistent failure as inevitable. When outcomes contradicted expectations, they assumed the assumptions were wrong. They discarded precedent, challenged authority, and rebuilt their understanding from irreducible truths. That process was slow, uncomfortable, professionally risky, and often ridiculed, but it was also how durable progress was made.</p><p>Cybersecurity now sits at that same inflection point. If attackers remain consistently successful, then prevention, detection, response, and compliance, while necessary, are almost certainly symptoms, not causes. Until we identify the true first principles of cybersecurity, we will continue to optimize the wrong system and wonder why the results never change.</p><p>The next step, then, is not another framework, maturity model, or control catalog. It is the harder task: to clearly define the atomic first principles of cybersecurity itself. I wrote a book about that and I will look at that next week.</p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Source</h1><p>Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Amazon. URL: https://amzn.to/4mI7QMU</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://amzn.to/4mI7QMU&quot;,&quot;text&quot;:&quot;Buy on Amazon&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://amzn.to/4mI7QMU"><span>Buy on Amazon</span></a></p><h1>References</h1><p>Alfred North Whitehead and Bertrand Russel, 1910. Principia Mathematica, Vol 1., Vol 2. Vol 3. [Books] URL: https://www.goodreads.com/book/show/6482515-principia-mathematica-vol-1</p><p>Aristotle, 350 BCE. Physics. [Book] MIT Classics. URL: https://classics.mit.edu/Aristotle/physics.mb.txt</p><p>Ashlee Vance, 2015. Elon Musk: Tesla, SpaceX, and the Quest for a Fantastic Future [Book]. URL: https://www.goodreads.com/book/show/25541028-elon-musk</p><p>Colby Hopkins, 2023. The History of Amazon and its Rise to Success [History]. Michigan Journal of Economics. URL: https://sites.lsa.umich.edu/mje/2023/05/01/the-history-of-amazon-and-its-rise-to-success/</p><p>Drake Baer, 2015. Elon Musk Uses This Ancient Critical-Thinking Strategy To Outsmart Everybody Else [Analysis] Business Insider. URL: https://www.businessinsider.com/elon-musk-first-principles-2015-1</p><p>Eric Hutchins, Michael Cloppert, Rohan Amin, 2010. Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains [White Paper]. Lockheed Martin Corporation. URL https://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf</p><p>Euclid, 300 BCE. Euclid&#8217;s Elements of Geometry [Book] Richard Fitzpatrick Collection, The University of Texas at Austin. Translated from the The Greek text of J.L. Heiberg (1883&#8211;1885). URL: https://farside.ph.utexas.edu/Books/Euclid/</p><p>Harry Deutsch, Oliver Marshall, and Andrew David Irvine, 1995 (First published); 2024 (substantive revision). Russell&#8217;s Paradox [Explainer]. Stanford Encyclopedia of Philosophy. URL: https://plato.stanford.edu/archives/win2025/entries/russell-paradox</p><p>Jeff Barr, 2014. Eight Years (And Counting) of Cloud Computing [History]. Amazon Web Services. URL https://aws.amazon.com/blogs/aws/eight-years-and-counting-of-cloud-computing/</p><p>John Kindervag, 2010. No More Chewy Centers: Introducing The Zero Trust Model Of Information Security [White Paper]. Palo Alto Networks. URL https://media.paloaltonetworks.com/documents/Forrester-No-More-Chewy-Centers.pdf</p><p>Kevin Rose, 2012.Elon Musk and Kevin Rose [Interview]. Kevin Rose Show - YouTube. URL:</p><div id="youtube2-L-s_3b5fRd8" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;L-s_3b5fRd8&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/L-s_3b5fRd8?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>Rene Descartes, 1644. The Principles of Philosophy [Book] Translated by John Veitch, Late Professor of Logic and Rhetoric in the University of Glasgow. URL: https://www.fulltextarchive.com/book/The-Principles-of-Philosophy/</p><p>Rick Howard, 2025. Part I: Is the CIA Triad Dead?: Why has the CIA Triad Endured? [Essay] First Principles Consulting Newsletter - Substack. URL: https://diffuser.substack.com/p/is-the-cia-triad-dead</p><p>Staff, 2007. Apple Reinvents the Phone with iPhone [Announcement]. Apple. URL https://www.apple.com/newsroom/2007/01/09Apple-Reinvents-the-Phone-with-iPhone/</p><p>Staff, 2012. Tesla Motors Launches Revolutionary Supercharger Enabling Convenient Long Distance Driving [Announcement]. Tesla Investor Relations. URL https://ir.tesla.com/press-release/tesla-motors-launches-revolutionary-supercharger-enabling</p><p>Staff, 2016. Marc Benioff [Profile]. MIT Initiative on the Digital Economy. URL https://ide.mit.edu/people/marc-benioff/</p><p>Steven Spielberg (Director), Sir Daniel Michael Blake Day-Lewis (Actor), 2012. Lincoln [Movie] URL: https://letterboxd.com/film/lincoln/</p><p>Steven Spielberg (Director), Sir Daniel Michael Blake Day-Lewis (Actor), 2012. Euclids&#8217; Statement of Equality [Movie] Gentle WorldOrg - YouTube. URL:</p><div id="youtube2-uZjIIMeKIJY" class="youtube-wrap" data-attrs="{&quot;videoId&quot;:&quot;uZjIIMeKIJY&quot;,&quot;startTime&quot;:null,&quot;endTime&quot;:null}" data-component-name="Youtube2ToDOM"><div class="youtube-inner"><iframe src="https://www.youtube-nocookie.com/embed/uZjIIMeKIJY?rel=0&amp;autoplay=0&amp;showinfo=0&amp;enablejsapi=0" frameborder="0" loading="lazy" gesture="media" allow="autoplay; fullscreen" allowautoplay="true" allowfullscreen="true" width="728" height="409"></iframe></div></div><p>William L. Hosch, Nancy Ashburn, n.d. Netflix [History]. Encyclopedia Britannica. URL https://www.britannica.com/money/Netflix-Inc</p><p>Willis H. Ware et al, 11 February 1970. The Ware Report: SECURITY CONTROLS FOR COMPUTER SYSTEMS (U): Report of Defense Science Board [Study] Defense Science Board - Task Force on Computer System Security - The Rand Corporation - Computer Security Resource Center - NIST. URL https://csrc.nist.gov/csrc/media/publications/conference-paper/1998/10/08/proceedings-of-the-21st-nissc-1998/documents/early-cs-papers/ware70.pdf</p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Lev Grossman's "The Bright Sword"]]></title><description><![CDATA[A Review]]></description><link>https://diffuser.substack.com/p/lev-grossmans-the-bright-sword</link><guid isPermaLink="false">https://diffuser.substack.com/p/lev-grossmans-the-bright-sword</guid><dc:creator><![CDATA[Rick Howard]]></dc:creator><pubDate>Mon, 05 Jan 2026 11:51:21 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!Hz_S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38672057-9a3a-4113-8ebc-04221b9f0524_329x500.jpeg" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Hz_S!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38672057-9a3a-4113-8ebc-04221b9f0524_329x500.jpeg" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Hz_S!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38672057-9a3a-4113-8ebc-04221b9f0524_329x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Hz_S!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38672057-9a3a-4113-8ebc-04221b9f0524_329x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Hz_S!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38672057-9a3a-4113-8ebc-04221b9f0524_329x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Hz_S!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38672057-9a3a-4113-8ebc-04221b9f0524_329x500.jpeg 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Hz_S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38672057-9a3a-4113-8ebc-04221b9f0524_329x500.jpeg" width="329" height="500" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/38672057-9a3a-4113-8ebc-04221b9f0524_329x500.jpeg&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:500,&quot;width&quot;:329,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:null,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:null,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:null,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Hz_S!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38672057-9a3a-4113-8ebc-04221b9f0524_329x500.jpeg 424w, https://substackcdn.com/image/fetch/$s_!Hz_S!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38672057-9a3a-4113-8ebc-04221b9f0524_329x500.jpeg 848w, https://substackcdn.com/image/fetch/$s_!Hz_S!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38672057-9a3a-4113-8ebc-04221b9f0524_329x500.jpeg 1272w, https://substackcdn.com/image/fetch/$s_!Hz_S!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F38672057-9a3a-4113-8ebc-04221b9f0524_329x500.jpeg 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>I&#8217;ve been in love with the King Arthur legend since I was a wee lad: noble knights in shining armor (Lancelot, Sir Galahad), heroic quests (the Holy Grail, the Lance of Longinus, The Questing Beast, The Dolorous Guard), chivalry (protect the weak and defenseless), mysterious wizards (Merlin, Morgan le Fay), magical entities (the Lady in the Lake, fairies, Avalon), magical weapons (Excalibur, Clarent, Galatine), and the adulterous love affair between Lancelot and Queen Guinevere that breaks the round table. I love all that stuff.</p><p>When I found out Lev Grossman had written a version of it, I was intrigued.. He&#8217;s the author of the excellent Magicians series, essentially Harry Potter for adults. Even better, Syfy adapted the book into a strong five-season TV series that ran from 2015 to 2020. I was in.</p><p>I read T.H. White&#8217;s &#8220;The Once and Future King&#8221; when I was in high school, but I have to admit, the stories didn&#8217;t cohere for me. They are at best, disjointed, and many are told secondhand. Characters have no depth or consistency. But I loved the idea of the round table and chivalrous knights. So, of course, I ran to the theater with my fianc&#233; (now wife) to see the 1981 movie &#8220;Excalibur.&#8221; I liked it but it was a mishmash of stories similar to White&#8217;s book and just plainly weird. I still loved the lore though.</p><p>Grossman fixes all of that. He presents a through line that I hadn&#8217;t seen before. Each character has a well-described back story, a narrative arc, that contributes to the overall saga. He doesn&#8217;t try to make everything realistic like in the Bernard Cornwell series, &#8220;The Warlord Chronicles;&#8221; a historical fiction trilogy that reimagines the Arthurian legend in a gritty, realistic setting of post-Roman Britain. No, he embraces the anachronisms like knights wearing plate armor, England, tournaments, castles, and Camelot. He expertly weaves magic into the story, such as casually sidestepping into the fairy world, as if it were as ordinary as eating breakfast in the morning.</p><p>At the end, Grossman writes a fascinating historical footnote that describes the Arthurian legend. He says that Arthur likely started in a collection of elegies for fallen warriors called &#8220;Y Gododdin.&#8221; And then, for 1400 years, each author that picked up the story added their own twist. Geoffrey of Monmouth (&#8221;Historia Regum Britanniae) in the twelfth century promoted Arthur to king, invented Merlin, and the &#8220;traitorous nephew&#8212;not yet son&#8212;named Mordred.&#8221; The Norman poet, Wace, added the Round Table 20 years later. Poet Chr&#233;tien de Troyes added the Holy Grail, Camelot, and the Arthur-Guinevere-Lancelot love triangle.</p><p>Grossman says that &#8220;Arthur didn&#8217;t spring to life fully formed, he was deposited in layers, slowly, over centuries, like the geological strata of a landscape... by authors who weren&#8217;t much interested in historical rigor.&#8221;</p><p>That is fascinating.</p><p>Back in the 1990s, my wife and I did a spur-of-the-moment trip to England. We didn&#8217;t have a plan. We we&#8217;re just trying to get away. We decided that we would just chase the Arthur legend. We visited Castle Tintagel (Arthur&#8217;s birthplace), Camelot (now a cow pasture), Glastonbury (site of the legendary Isle of Avalon where Arthur was taken to heal after his final battle, Arthur and Guinevere&#8217;s burial site, a rest stop where Joseph of Arimathea is said to have brought the Holy Grail, and entrance to the fairy realm of Annwn). It didn&#8217;t matter that none of that is true in the historical sense. All of those locations invoked the feeling of the Arthurian legend and I was in heaven.</p><p>If you&#8217;re a King Arthur fan, Grossman&#8217;s book is for you. It invokes the Arthurian legend in a fresh and coherent way unlike anything I have experienced before.</p><ul><li><p>Recommended for Arthurian Legend Fans</p></li><li><p>Recommended for Lev Grossman fans</p></li><li><p>Recommended for &#8220;The Magicians&#8221; book series and TV show.</p></li><li><p>Needs to be a movie</p></li></ul><p></p><div class="subscription-widget-wrap-editor" data-attrs="{&quot;url&quot;:&quot;https://diffuser.substack.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="SubscribeWidgetToDOM"><div class="subscription-widget show-subscribe"><div class="preamble"><p class="cta-caption">Rick's First Principles Newsletter is a reader-supported publication. To receive new posts and support my work, consider becoming a free or paid subscriber.</p></div><form class="subscription-widget-subscribe"><input type="email" class="email-input" name="email" placeholder="Type your email&#8230;" tabindex="-1"><input type="submit" class="button primary" value="Subscribe"><div class="fake-input-wrapper"><div class="fake-input"></div><div class="fake-button"></div></div></form></div></div><p></p><h1>Source</h1><p>Lev Grossman, 2024. <strong>The Bright Sword</strong> [Book]. Narrated by Nicholas Guy Smith. Goodreads. URL <a href="https://www.goodreads.com/book/show/201750794-the-bright-sword">https://www.goodreads.com/book/show/201750794-the-bright-sword</a></p><h2>References without Notes</h2><p>Alfred Tennyson, 1885. <strong>Idylls of the King</strong> [Book]. Goodreads. URL <a href="https://www.goodreads.com/book/show/393636.Idylls_of_the_King">https://www.goodreads.com/book/show/393636.Idylls_of_the_King</a></p><p>Aneirin, 1300. <strong>Y Gododdin</strong> [Poem]. Goodreads. URL <a href="https://www.goodreads.com/book/show/1250908.Y_Gododdin">https://www.goodreads.com/book/show/1250908.Y_Gododdin</a>.</p><p>Bernard Cornwell, 1994. The Winter King (The Warlord Chronicles, #1) [Book]. Goodreads. URL <a href="https://www.goodreads.com/book/show/68520.The_Winter_King">https://www.goodreads.com/book/show/68520.The_Winter_King</a></p><p>Bernard Cornwell, 1996. <strong>Enemy of God (The Warlord Chronicles, #2)</strong> [Book]. Goodreads. URL <a href="https://www.goodreads.com/book/show/68524.Enemy_of_God">https://www.goodreads.com/book/show/68524.Enemy_of_God</a></p><p>Bernard Cornwell, 1997. <strong>Excalibur (The Warlord Chronicles, #3)</strong> [Book]. Goodreads. URL <a href="https://www.goodreads.com/book/show/68521.Excalibur">https://www.goodreads.com/book/show/68521.Excalibur</a></p><p>Boorman, J., 1981. <strong>Excalibur</strong> [Movie]. IMDb. URL <a href="https://www.imdb.com/title/tt0082348/">https://www.imdb.com/title/tt0082348/</a></p><p>Geoffrey of Monmouth, 1136. <strong>Historia Regum Britanniae: Arthurian Classics</strong> [Book]. Goodreads. URL <a href="https://www.goodreads.com/book/show/51523760-historia-regum-britanniae">https://www.goodreads.com/book/show/51523760-historia-regum-britanniae</a></p><p>Lev Grossman, 2009. <strong>The Magicians (The Magicians, #1)</strong> [Book]. Goodreads. URL <a href="https://www.goodreads.com/book/show/6101718-the-magicians">https://www.goodreads.com/book/show/6101718-the-magicians</a></p><p>Sera Gamble, John McNamara, 2015. <strong>The Magicians</strong> [5 Season TV Series 2015 - 2020]. IMDb. URL <a href="https://www.imdb.com/title/tt4254242/">https://www.imdb.com/title/tt4254242/</a></p><p>Thomas Malory, 1485. <strong>Le Morte d&#8217;Arthur: King Arthur and the Legends of the Round Table </strong>[Book]. Goodreads. URL <a href="https://www.goodreads.com/book/show/672875.Le_Morte_d_Arthur">https://www.goodreads.com/book/show/672875.Le_Morte_d_Arthur</a></p><p>T.H. White, 1958. <strong>The Once and Future King</strong> [Book]. Goodreads. URL <a href="https://www.goodreads.com/book/show/43545.The_Once_and_Future_King">https://www.goodreads.com/book/show/43545.The_Once_and_Future_King</a></p><p></p>]]></content:encoded></item></channel></rss>