Countdown to Zero Day

Countdown to Zero Day
Author: Kim Zetter
Publisher: Crown
Total Pages: 450
Release: 2015-09-01
Genre: History
ISBN: 0770436196

A top cybersecurity journalist tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a megaton bomb. “Immensely enjoyable . . . Zetter turns a complicated and technical cyber story into an engrossing whodunit.”—The Washington Post The virus now known as Stuxnet was unlike any other piece of malware built before: Rather than simply hijacking targeted computers or stealing information from them, it proved that a piece of code could escape the digital realm and wreak actual, physical destruction—in this case, on an Iranian nuclear facility. In these pages, journalist Kim Zetter tells the whole story behind the world’s first cyberweapon, covering its genesis in the corridors of the White House and its effects in Iran—and telling the spectacular, unlikely tale of the security geeks who managed to unravel a top secret sabotage campaign years in the making. But Countdown to Zero Day also ranges beyond Stuxnet itself, exploring the history of cyberwarfare and its future, showing us what might happen should our infrastructure be targeted by a Stuxnet-style attack, and ultimately, providing a portrait of a world at the edge of a new kind of war.

Summary of Kim Zetter's Countdown to Zero Day

Summary of Kim Zetter's Countdown to Zero Day
Author: Everest Media,
Publisher: Everest Media LLC
Total Pages: 70
Release: 2022-04-16T22:59:00Z
Genre: History
ISBN: 1669385280

Please note: This is a companion version & not the original book. Sample Book Insights: #1 In 2010, Sergey Ulasen, head of the antivirus division of a small computer security firm in Belarus, found a computer virus that used a rootkit to cloak itself and make it invisible to antivirus engines. It used a shrewd zero-day exploit to spread from machine to machine. #2 The mystery files came to the attention of VirusBlokAda when a reseller in Iran reported a persistent problem with a customer’s machine. The computer was caught in a reboot loop, crashing and rebooting repeatedly while defying the efforts of technicians to control it. #3 The two hackers found a rootkit on the system in Iran that was designed to hide four malicious. LNK files. The malware appeared to be using an exploit to spread itself via infected USB flash drives. The rootkit prevented the. LNK files from being seen on the flash drive. #4 The LNK exploit attacked a fundamental feature of Windows systems, and was much more severe than Autorun exploits. It was discovered by a security firm that had never heard of VirusBlokAda. The drivers that were dropped onto targeted machines were signed with a legitimate digital certificate from a company called RealTek Semiconductor.

Listening In

Listening In
Author: Susan Landau
Publisher: Yale University Press
Total Pages: 238
Release: 2017-11-28
Genre: Computers
ISBN: 0300231555

A cybersecurity expert and former Google privacy analyst’s urgent call to protect devices and networks against malicious hackers and misinformed policymakers New technologies have provided both incredible convenience and new threats. The same kinds of digital networks that allow you to hail a ride using your smartphone let power grid operators control a country’s electricity—and these personal, corporate, and government systems are all vulnerable. In Ukraine, unknown hackers shut off electricity to nearly 230,000 people for six hours. North Korean hackers destroyed networks at Sony Pictures in retaliation for a film that mocked Kim Jong-un. And Russian cyberattackers leaked Democratic National Committee emails in an attempt to sway a U.S. presidential election. And yet despite such documented risks, government agencies, whose investigations and surveillance are stymied by encryption, push for a weakening of protections. In this accessible and riveting read, Susan Landau makes a compelling case for the need to secure our data, explaining how we must maintain cybersecurity in an insecure age.

The Cyberdimension

The Cyberdimension
Author: Eric Trozzo
Publisher: Wipf and Stock Publishers
Total Pages: 285
Release: 2019-04-29
Genre: Religion
ISBN: 153265121X

In 2013, Edward Snowden released a trove of documents revealing the extent of government electronic surveillance. Since then, we have been inundated with reports of vicious malware attacks, election hacking, data breaches, potential cyberwars, fights over Net Neutrality, and fake internet news. Where once discussion of cyberspace was full of hope of incredible potential benefits for humanity and global connection, it has become the domain of fear, anxiety, conflict, and authoritarian impulses. As the cloud of the Net darkens into a storm, are there insights from Christian theology about our online existence? Is the divine present in this phenomenon known as cyberspace? Is it a realm of fear or a realm of hope? In The Cyberdimension, Eric Trozzo engages these questions, seeking not only a theological means of speaking about cyberspace in its ambiguity, but also how the spiritual dimension of life provokes resistance to the reduction of life to what can be calculated. Rather than focusing on the content available online, he looks to the structure of cyberspace itself to find a chastened yet still expectant vision of divinity amidst the political, economic, and social forces at play in the cyber realm.

Twenty-First Century Military Innovation

Twenty-First Century Military Innovation
Author: Marcus Schulzke
Publisher: University of Michigan Press
Total Pages: 289
Release: 2022-09-07
Genre: Political Science
ISBN: 0472133136

Contemporary war is as much a quest for decisive technological, organizational, and doctrinal superiority before the fighting starts as it is an effort to destroy enemy militaries during battle. Armed forces that are not actively fighting are instead actively reengineering themselves for success in the next fight and imagining what that next fight may look like. Twenty-First Century Military Innovation outlines the most theoretically important themes in contemporary warfare, especially as these appear in distinctive innovations that signal changes in states’ warfighting capacities and their political goals. Marcus Schulzke examines eight case studies that illustrate the overall direction of military innovation and important underlying themes. He devotes three chapters to new weapons technologies (drones, cyberweapons, and nonlethal weapons), two chapters to changes in the composition of state military forces (private military contractors and special operations forces), and three chapters to strategic and tactical changes (targeted killing, population-centric counterinsurgency, and degradation). Each case study includes an accessible introduction to the topic area, an overview of the ongoing scholarly debates surrounding that topic, and the most important theoretical implications. An engaging overview of the themes that emerge with military innovation, this book will also attract readers interested in particular topic areas.

The Cyber Deterrence Problem

The Cyber Deterrence Problem
Author: Aaron F. Brantly
Publisher: Rowman & Littlefield
Total Pages: 203
Release: 2020-06-15
Genre: Political Science
ISBN: 1786615665

The national security of the United States depends on a secure, reliable and resilient cyberspace. The inclusion of digital systems into every aspect of US national security has been underway since World War II and has increased with the proliferation of Internet-enabled devices. There is an increasing need to develop a robust deterrence framework within which the United States and its allies can dissuade would-be adversaries from engaging in various cyber activities. Yet despite a desire to deter adversaries, the problems associated with dissuasion remain complex, multifaceted, poorly understood and imprecisely specified. Challenges, including credibility, attribution, escalation and conflict management, remain ever-present and challenge the United States in its efforts to foster security in cyberspace. These challenges need to be addressed in a deliberate and multidisciplinary approach that combines political and technical realities to provide a robust set of policy options to decision makers. The Cyber Deterrence Problem brings together a multidisciplinary team of scholars with expertise in computer science, deterrence theory, cognitive psychology, intelligence studies and conflict management to analyze and develop a robust assessment of the necessary requirements and attributes for achieving deterrence in cyberspace. Beyond simply addressing the base challenges associated with deterrence, many of the chapters also propose strategies and tactics to enhance deterrence in cyberspace and emphasize conceptualizing how the United States deters adversaries.

Dark Territory

Dark Territory
Author: Fred Kaplan
Publisher: Simon and Schuster
Total Pages: 334
Release: 2016-03-01
Genre: History
ISBN: 1476763275

“An important, disturbing, and gripping history” (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars—where every country can be a major power player and every hacker a mass destroyer. In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer security. From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role, Dark Territory chronicles a little-known past that shines an unsettling light on our future. Fred Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the “information warfare” squads of the military services, and the national security debates in the White House to reveal the details of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning—and (more often than people know) fighting—these wars for decades. “An eye-opening history of our government’s efforts to effectively manage our national security in the face of the largely open global communications network established by the World Wide Web….Dark Territory is a page-turner [and] consistently surprising” (The New York Times).

The Cybersecurity Dilemma

The Cybersecurity Dilemma
Author: Ben Buchanan
Publisher: Oxford University Press
Total Pages: 300
Release: 2017-02-01
Genre: Political Science
ISBN: 0190694807

Why do nations break into one another's most important computer networks? There is an obvious answer: to steal valuable information or to attack. But this isn't the full story. This book draws on often-overlooked documents leaked by Edward Snowden, real-world case studies of cyber operations, and policymaker perspectives to show that intruding into other countries' networks has enormous defensive value as well. Two nations, neither of which seeks to harm the other but neither of which trusts the other, will often find it prudent to launch intrusions. This general problem, in which a nation's means of securing itself threatens the security of others and risks escalating tension, is a bedrock concept in international relations and is called the 'security dilemma'. This book shows not only that the security dilemma applies to cyber operations, but also that the particular characteristics of the digital domain mean that the effects are deeply pronounced. The cybersecurity dilemma is both a vital concern of modern statecraft and a means of accessibly understanding the essential components of cyber operations.

Crime Dot Com

Crime Dot Com
Author: Geoff White
Publisher: Reaktion Books
Total Pages: 345
Release: 2020-09-12
Genre: True Crime
ISBN: 1789142865

From Anonymous to the Dark Web, a dizzying account of hacking—past, present, and future. “Brilliantly researched and written.”—Jon Snow, Channel 4 News “A comprehensive and intelligible account of the elusive world of hacking and cybercrime over the last two decades. . . . Lively, insightful, and, often, alarming.”—Ewen MacAskill, Guardian On May 4, 2000, an email that read “kindly check the attached LOVELETTER” was sent from a computer in the Philippines. Attached was a virus, the Love Bug, and within days it had been circulated across the globe, paralyzing banks, broadcasters, and businesses in its wake, and extending as far as the UK Parliament and, reportedly, the Pentagon. The outbreak presaged a new era of online mayhem: the age of Crime Dot Com. In this book, investigative journalist Geoff White charts the astonishing development of hacking, from its conception in the United States’ hippy tech community in the 1970s, through its childhood among the ruins of the Eastern Bloc, to its coming of age as one of the most dangerous and pervasive threats to our connected world. He takes us inside the workings of real-life cybercrimes, drawing on interviews with those behind the most devastating hacks and revealing how the tactics employed by high-tech crooks to make millions are being harnessed by nation states to target voters, cripple power networks, and even prepare for cyber-war. From Anonymous to the Dark Web, Ashley Madison to election rigging, Crime Dot Com is a thrilling, dizzying, and terrifying account of hacking, past and present, what the future has in store, and how we might protect ourselves from it.