Categories
Cyberinfrastructure Education Globalization Innovation Network Reading Technology

Latest Read: This Is How They Tell Me the World Ends

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth. Nicole covers cybersecurity and digital espionage for The New York Times. Certainly this is one of the more anticipated books addressing a new cyber arms race. More than ever before, it is imperative to understand how a global market for Zero Day exploits began and today how it is certainly tipping the scales.

This Is How They Tell Me the World Ends The Cyberweapons Arms Race

Quite frankly, Nicole’s reporting will stun readers. This book will also surprise long time IT professionals.

As it seems so often in life, by chance, a ‘stumbling’ idea took hold. Initially a company in 2003 began buying exploits from hackers for as little as $75. Fast forward to today, a good iOS zero day commands over $3 million dollars.

Nicole begins her reporting role at the NYTimes by reviewing secret documents leaked by Edward Snowden and Glen Greenwald.

This of course revealing the illegal spying on American citizens by the Bush Administration. At the same time, this project was tapping phone calls of German Chancellor Angela Merkel. The Guardian obtained copies via Greenwald who passed a copy to the NYTimes. This proved to be her introduction to the cyber world.

In addition, Nicole retells the hard lessons from Soviet spying (actually from within the US embassy) in Moscow back in the 1950s. This reveals a good baseline to today’s advanced attacks including the resources and dedication necessary to carry them out.

Cyber weapons for Board rooms

Chapter One’s Closet of Secrets is certainly mandatory reading for organizational leaders. It will become very apparent that organizations must reconsider their outdated understanding of information security. One cannot walk away from this book ignoring an often repeated message: your organization has already been hacked, or your organization does not yet realize it has been hacked. Thus, Nicole makes the case in her interviews with hackers that every computer, phone, network, or storage drive has been compromised.

Categories
Cyberinfrastructure Education Globalization Innovation Network Reading Technology

Latest Read: The Perfect Weapon

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by David E. Sanger is an amazing read. To be frank this book is very quite unnerving, yet should be certainly mandatory reading. We have been at war for a couple of years on an electronic battlefield. This seems to be acting as a deterrent to actual war on a global scale.

Above all, we live today in a more complex world now regarding COVID-19. Recent cyber attacks and the flattening of attack tools is unquestionably changing the world right in-front of our eyes.

Sanger’s book will help you see it even more clearly: today a perfect storm is forming across the internet.

Therefore, The Perfect Weapon reveals so much in the opening chapters regarding successful Russian attacks upon US military and government networks.

On the contrary, the previous generation was driven by nuclear mutually assured destruction. In contrast, cyberwar or ‘cyber conflict’ is very different.

Russia’s penetration of the Pentagon’s secret network in 2008 in fact, is very upsetting reading. Sanger recalls how NSA’s Debora Plunkett discovered rogue USB sticks, left scattered across a US military base parking lot in the Middle East provided Moscow’s entry into the Pentagon networks.

WannaCry ransomware

North Korea is the boldest example of this book’s theme: A backwards third world country hacking Sony? Yes. In addition, North Korea launched the devastating WannaCry ransomware attack. On the other hand, their ransomware was unleashed across global hospitals and schools. Can you imagine WannaCry 3.0 locking down hospitals in the mist of stopping coronavirus?

Categories
Education Ransomware Reading Technology

Latest Read: Sandworm

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers by Wired’s Andy Greenberg is most certainly a facinating story regarding Russia’s cyber attacks upon Ukraine. In fact, the backstory to Sandworm is quite remarkable. Attacks by Russia against Ukraine are just the latest in a long history of Russian aggression.

Greenberg’s work is certainly remarkable. This provides deep storylines linking Russia to NotPetya, a ransomware attack launched against Ukraine in 2016. Elements of this attack were initially launched as reconnaissance in the prior year.

At the same time, Greenberg provides amazing details regarding cyber attacks Moonlight Maze, Operation Aurora on America by Russia and China.

Indeed Sandworm provides a historical view between Russia and Ukraine upon the heels of World War II.

Harvest of Sorrow

In this period, Stalin produced a truely horrific famine across Ukraine. Unquestionably, the exploitation of Ukraine by the Soviet Union and Hitler’s Germany resulted in the torture and death of millions of Ukrainians. Greenberg notes the unbelievable but true horror by author Anne Applebaum in Red Famine: Stalin’s War on Ukraine:

“stories of desperate peasants resorting to eating leather and rodents, grass, and, in states of starvation-induced mania, even their own children. All of this occurred in one of the most fertile grain-production regions in the world.”

Red Famine by Anne Applebaum

In addition, these horrific attacks are echoed in Harvest of Sorrow by Soviet scholar Robert Conquest. Red Famine’s lessons provide a razor sharp backdrop to Russia’s invasion of Ukraine following the 2014 Winter Olympics in Sochi. This is only the latest attack in a long confrontation between Russia and Ukraine.

Categories
Cyberinfrastructure Education Flat World Globalization Innovation Network OpenSource Reading Technology

Latest Read: Countdown to Zero Day

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon by Kim Zetter is an amazing story. The NSA and Mossad worked to derail the nuclear weapons program of Iran. This begins an amazing story regarding stuxnet. In the end this is a wonderful story about imagination.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

The history Kim traces is deeper than anyone could first imagine. Think about your favorite spy movie and technology. Countdown to Zero Day is going to shake you up as I found this book difficult to put down.

The International Atomic Energy Agency learned that centrifuges at an enrichment plant in Natanz were failing at an unprecedented rate. The US and Israel were able to deploy Stuxnet to Siemens industrial control systems in Iran.

Zetter opens this story in Belarus. A computer security firm with customers in Iran found what they initially thought was a rootkit. The virus was causing systems to repeatedly crash and reboot. When they could not resolve the issue they called Sergey Ulasen.

Categories
Design Education Globalization Innovation Reading Technology

Latest read: The Numerati

This is not a book about Dan Brown’s character, Robert Langdon and his fight against the Illuminati in Angels & Demons.  This is The Numerati, a slight spin on very advanced mathematics and high performance computing, the future of shopping, medicine, safety, sex, voting and yes …. even work.
the numeratiThe Numerati is a great read regarding the impact of advanced analytics across the board.  I was impressed with mathematicians Baker interviews and the surprising number who eventually work for IBM or the NSA.  Baker has written a book about how the best mathematicians are changing the way we live by processing amazingly vast amounts of data and simply detecting patterns.  The data comes via mouse-clicks, cell phone calls and credit card purchases just to name a few.

It sounds simple.  On the surface with today’s high performance computing and powerful consumer technologies.  But Baker shows how mathematicians are working to draw upon extremely high levels of computational power to deliver products and solutions that will dramatically impact our lives.

At the same time some of the projects mentioned seems more ‘wonderland’ in design. Yet consider the amount of data created by the Large Hadron Collider for example, the emerging world of Big Science is just starting to take off.

Chapters tackle different subjects (mentioned above) and as others. Many have indicated the shopping chapter is the best of the book. It was very enjoyable to read.  Some of the ideas and inventions about health were interesting, some ideas a bit hard to wrap around your brain – like the ability of a floor tile to detect if your elderly father has a change in an existing medical condition.  Another example, how a computer can analyze a sequence of video (over time) and determine in your are prone to suffering Parkinson’s disease.