The Art of a Good Book Blurb

We did a little experiment recently with book blurbs. Blurbs are the few words on the back of a paperback that entice you into its pages and are a key tool in selling. Without a good one, the perspective reader will return your book to the shelf and select another author’s. It’s therefore important to find a way for those two-dozen words to make an impact. But how?

paperback-books-1309582-1278x849Our experiment was prompted when I started to think about blurbs for my latest thriller, The Rival. I eventually came up with 25 words that I felt effectively engaged the reader and I was pleased with the result. For a comparison, I re-read the blurb I’d created for Eavesdrop in conjunction with my publisher a couple of years before and realised that Eavesdrop’s blurb was missing something that the one I had just moulded for The Rival had somehow captured. But why did one feel so much more effective? I read and re-read them before I suddenly realised the difference was in the depth of emotional involvement.

The original wording for Eavesdrop had been search engine optimized; it captured the most important and exciting plot points; it displayed the style and tone of the book; it was short and punchy. But it didn’t engage in the same way. So I decided to test my new theory, and re-wrote it with the aim of putting the reader in the shoes of the protagonist. Instead of saying what he did, I instead asked, what you would do in the same situation?

book-eyes-1251357To test whether my thoughts on this were correct, we then held an on-line poll among readers to get their view on 3 slightly different blurbs for Eavesdrop.  We used the original one that had been so highly polished with my publishers, and put it alongside the one that maximized emotional engagement, and threw in a third that I made up in ten seconds. Here they are below in random order. Read them quickly. Don’t analyze them just yet, but simply read them as you would in a bookshop and see which draws you in most:

Smuggling and industrial sabotage leave Customs Investigator James Winter’s career in tatters.  Who arranged his dismissal, and what’s their link to Middle East Assassins?

Your Customs Investigator career in ruins, your wife fighting cancer… What do you do when you discover the reason behind your dismissal is a police cover-up, and that there’s a way to prove your innocence?

James Winter’s career is trashed when a Mossad plan to track Syrian assassins has unexpected consequences. His fight for re-instatement uncovers a Middle East plot that suddenly threatens his own life.

So which of those made you most want to open the book and see what chapter one is like? The results in our poll were conclusive, with the middle one a winner by a large margin. The theory I’d stumbled upon merely by observation had been proven.

So, the secret of a good book blurb is to emotionally engage your perspective reader and to get him or her to feel what it would be like if they were your protagonist. As soon as they experience the same adrenaline surge, the same despair, the same anger as the hero, then the blurb has done its job. They are emotionally engaged, and so much closer to buying that book.


About the Author

Eavesdrop-cover-square

Ian Coates is the author of a thriller, Eavesdrop, originally published by Bad Day Books, the suspense and thriller imprint of Assent Publishing.  He worked in the high tech electronics industry for 30 years, where he specialised in the design of radio communication equipment. His intimate knowledge of that environment always triggered his imagination to think about the mysterious world of spies, and allowed him to bring a unique authenticity to his thriller. Ian is proud to support the British Science Association and donates a proportion of his book proceeds to that charity.  He lives and writes in Worcestershire with his wife and two daughters.

Amazon website

Author’s website

Facebook

Twitter

Advertisements

High-Tech & the Modern Thriller

Modern readers expect pace-racing action, an intriguing plot, and realistic characters. But they also demand a believable story, and that presents a unique challenge to thriller writers in today’s world of high-tech gadgets, the internet, and massive computing power.

I love working with high-tech. I graduated in electronics in the eighties, and the exciting gadgets and ideas that engineers generate never fail to amaze me. I try to use that experience to enhance my writing, and in this two-part blog, we’ll look at some of the constraints and difficulties our high-tech world imposes on story lines, the new challenges authors must grapple with to maintain realism, but also the fresh opportunities that new technology offers for plot ideas.

High Tech in the Crucible

For Agatha Christie, it was simple. Suspense could easily be generated by imprisoning her book’s characters in an environment in which mortal danger lurks, but from which they cannot escape. This is sometimes known as “The Crucible” technique.

Trapping them there is a simple way to create tension—take six friends and place them in a manor house surrounded by ten feet thick snowdrifts; they cannot leave. Now murder one of their party, and the opportunity for tension is obvious. The murderer is one of the five still alive; he or she is still in their midst because there is no way to leave. And if they find someone has snipped the phone line, they cannot call for support. They are stuck with a murderer without help. What was his motive? Will he strike again?

While that was fine for the 1950s, it is hard to make such scenarios work these days. Any of the guests could call the emergency services from their mobile, or send a Tweet to the lmobilephone-smlocal police station. The modern writer creating stories based in the 21st century must therefore work a little harder than their predecessors to make crucibles work.

And technology makes plot lines more difficult in other situations, not just the crucible. Barely twenty-five years ago, no-one but the richest high-fliers had a mobile phone; today, seventy-five percent of the world’s population can make a phone call almost anywhere across the globe. These days, a 4G phone call can be made on Mount Everest to an altitude of 5,200m[i]. This means modern authors cannot be lazy. They must work at their plots to ensure they remain realistic in the modern world.

When writing Eavesdrop, which has pivotal scenes in Finland, I had to site some of them in the country’s remoter northern areas away from its capital Helsinki so that the hero couldn’t simply use his phone to tell the authorities what he’d discovered. These days, isolation can be difficult to achieve.

OLYMPUS DIGITAL CAMERA

As spy writer Charles Cummings pointed out in an article for The Times[ii], technologies such as number-plate recognition cameras and computer systems that track phone calls and credit card swipes mean a terrorist is no longer able to drive across Europe unseen.  Now, one’s character must have access to credit cards in false names (and must therefore have a means to obtain those, despite all of today’s identity checks), and have contacts who can arrange false car registration plates, as well as access to large amounts of cash without arising suspicion.creditcard

None of these are impossible; they simply make the author’s work harder to maintain realism.

 

Demands on the Modern Writer

As well as recent advances in technology imposing constraints on modern plot lines, they also place a demand on authors to keep abreast of what’s possible.

F16 jetFor instance, hacking and virus generation are now sciences in their own right, and the author needs to be aware of what can be done. Think, for instance, of Israel’s scheme to destroy Iranian nuclear plants in 2008. They could have sent F15 and F16 fighters across Saudi Arabia from their Negev base to drop 2000lb bombs on the reactors as they did in 1981. However, twenty-seven years later they took a more subtle approach.

In conjunction with American intelligence experts, Israel’s software engineers developed a computer worm (a type of virus) they christened Staxret. Once released, the virus spread throughout the world’s computer networks to hunt the specific Siemens computers known to be running the Iranian’s uranium enrichment plants. Once it had infected those in the centre of the Iranian facilities at Natanz, the virus exploited a known security vulnerability of the computer to take control of the plant’s centrifuges. While reporting back to the centre’s control desk that all was well in the system, it secretly sped up the centrifuges to such unprecedented speeds that they started to break. One thousand centrifuges were rendered inoperable before anyone realised something was amiss.

No-one has yet made public how the worm succeeded in reaching the Iranian computers—something it managed to do despite those computers deliberately being isolated from the internet. It is surmised that they entered by first infecting laptops used by technicians that worked there, which were later connected to the main computers during maintenance procedures.

Novelists must obviously know and understand the methods deployed to deliver computer viruses to their target.

DVDThere are frequent cases of industrial espionage, where hackers have succeeded in getting their spying software installed on their victims’ computers. Some years ago, a London couple ran a profitable but illegal business selling trade secrets. Their main tool was a piece of highly sophisticated software (called a Trojan), which they embedded in DVDs containing business proposals, which they mailed to CEOs of a variety of companies. Because their software was so targeted at those individuals, the anti-virus programs failed to detect it, and the CEOs happily inserted the disks into their machines. The Trojan set to work and scanned the companies’ entire computer systems. Anything interesting was copied and sent back to the hackers, who promptly sold them to that company’s competitors.

The modern thriller author must understand these techniques, at least in basic terms, if they are to maintain realism. How? Search internet technology news sites for such stories, and a wealth of real-life examples come to hand from which to copy.

Of-course, Edward Snowden’s leaks have placed details of many high-tech espionage techniques into the public domain, and these can again provide the author with an appreciation of what is currently possible. For example, he leaked information about USBhow the NSA developed an innocent-looking USB lead with a tiny transmitter built into the connector. A spy just needed to break into an office and swap the cable with one already in use (for example to a printer), and they’ve got access to that computer’s data the moment its owner entered their password the next day.

And what about eavesdropping on mobile phone conversations? Although phone tapping isn’t as easy as in the days of copper cable, everyone knows from media reports of phone hacking that it’s possible to intercept cellular phone calls. A common technique is what is known as “man-in-the-middle”, where the spy has equipment that mimics a base station (just google ‘Stingray spy tool’ to discover more). As the victim’s phone comes near, it locks to the spy’s fake base-station’s radio signal rather than the genuine one because it’s stronger. All of the phone’s traffic then passes through the spy’s hands, which he forwards on to the real base-station so that his presence isn’t spotted, while taking a copy for himself. It can even instruct the victim’s phone to reduce the encryption level to make the data easier to decipher.

Accounts of such events are easily available via news articles, and authors should regularly scour such sources.

Next month

In the second blog of this two-part series, we’ll look at what opportunities modern technology brings to fiction storylines.

Acknowledgments

[i] The Telegraph, 5th July 2013

[ii] Has Modern Technology Killed the Spy Thriller? The Times. July 2014

Photographs (freeimages.com) by: Natalia Pankova, Stefano Barni, Pietro Ricciardi, Chris Cockran, Lotus Head, Nick Benjamisz, Philippe Ramaken, Ryan Bowen, Simon Stratford, Colin Adamson, Matthew Bowden.

About the author

Eavesdrop-cover-squareEavesdrop (originally published by Assent Publishing) is a thriller of assassins, modern-day smugglers, and high-tech spies. Who ruined Customs Investigator James Winter’s career, and what’s their link to a Middle East assassination plot?

Find it on Amazon

More About the Author