Categories
Cyberinfrastructure Education Globalization Innovation Network Reading Technology

Latest Read: This Is How They Tell Me the World Ends

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race by Nicole Perlroth. Nicole covers cybersecurity and digital espionage for The New York Times. Certainly this is one of the more anticipated books addressing a new cyber arms race. More than ever before, it is imperative to understand how a global market for Zero Day exploits began and today how it is certainly tipping the scales.

This Is How They Tell Me the World Ends The Cyberweapons Arms Race

Quite frankly, Nicole’s reporting will stun readers. This book will also surprise long time IT professionals.

As it seems so often in life, by chance, a ‘stumbling’ idea took hold. Initially a company in 2003 began buying exploits from hackers for as little as $75. Fast forward to today, a good iOS zero day commands over $3 million dollars.

Nicole begins her reporting role at the NYTimes by reviewing secret documents leaked by Edward Snowden and Glen Greenwald.

This of course revealing the illegal spying on American citizens by the Bush Administration. At the same time, this project was tapping phone calls of German Chancellor Angela Merkel. The Guardian obtained copies via Greenwald who passed a copy to the NYTimes. This proved to be her introduction to the cyber world.

In addition, Nicole retells the hard lessons from Soviet spying (actually from within the US embassy) in Moscow back in the 1950s. This reveals a good baseline to today’s advanced attacks including the resources and dedication necessary to carry them out.

Cyber weapons for Board rooms

Chapter One’s Closet of Secrets is certainly mandatory reading for organizational leaders. It will become very apparent that organizations must reconsider their outdated understanding of information security. One cannot walk away from this book ignoring an often repeated message: your organization has already been hacked, or your organization does not yet realize it has been hacked. Thus, Nicole makes the case in her interviews with hackers that every computer, phone, network, or storage drive has been compromised.

Categories
Cyberinfrastructure Education Globalization Innovation Network Reading Technology

Latest Read: The Perfect Weapon

The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by David E. Sanger is an amazing read. To be frank this book is very quite unnerving, yet should be certainly mandatory reading. We have been at war for a couple of years on an electronic battlefield. This seems to be acting as a deterrent to actual war on a global scale.

Above all, we live today in a more complex world now regarding COVID-19. Recent cyber attacks and the flattening of attack tools is unquestionably changing the world right in-front of our eyes.

Sanger’s book will help you see it even more clearly: today a perfect storm is forming across the internet.

Therefore, The Perfect Weapon reveals so much in the opening chapters regarding successful Russian attacks upon US military and government networks.

On the contrary, the previous generation was driven by nuclear mutually assured destruction. In contrast, cyberwar or ‘cyber conflict’ is very different.

Russia’s penetration of the Pentagon’s secret network in 2008 in fact, is very upsetting reading. Sanger recalls how NSA’s Debora Plunkett discovered rogue USB sticks, left scattered across a US military base parking lot in the Middle East provided Moscow’s entry into the Pentagon networks.

WannaCry ransomware

North Korea is the boldest example of this book’s theme: A backwards third world country hacking Sony? Yes. In addition, North Korea launched the devastating WannaCry ransomware attack. On the other hand, their ransomware was unleashed across global hospitals and schools. Can you imagine WannaCry 3.0 locking down hospitals in the mist of stopping coronavirus?

Categories
Cloud Design Education Flat World Globalization Google Innovation OpenSource Reading Rich media Tablet Technology TED

Latest Read: When Gadgets Betray Us

Robert Vamosi wrote When Gadgets Betray Us: The Dark Side of Our Infatuation With New Technologies in 2013. Today in the age of COVID-19 this book remains very relevant. Upon his book release, Robert spoke at Microsoft Research.

When Gadgets Betray Us: The Dark Side of Our Infatuation With New Technologies
When Gadgets Betray Us: The Dark Side of Our Infatuation With New Technologies

When Gadgets Betray Us is really about the internet of things (IoT) and the explosion of cheap gadgets.

This is a two fold problem: the impulse of human behavior to jump right into a new, innovative, ‘shiny’ devices. We more often skip reading the manual. Who reads manuals anyway these days?

However the ability for a nation state to remotely hack building controls and manipulate industrial machines seemed like stuff from a Hollywood movie, even back in 2013.

Clearly Vamosi could not have considered the impact of Stuxnet, the attack by Israel and the US NSA to destroy centrifuges in an underground facility in Iran. My review Countdown to Zero Day will surprise many readers.

This is a good starting point for many readers. Generally When Gadgets Betray Us reveals how our devices (phones, cars, smart watches, home thermostats and even baby monitors leaked location data. Worse, baby monitors permitted hackers to hijack the video feeds meant for remote grandparents, family and friends.

Categories
Education Ransomware Reading Technology

Latest Read: Sandworm

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin’s Most Dangerous Hackers by Wired’s Andy Greenberg is most certainly a facinating story regarding Russia’s cyber attacks upon Ukraine. In fact, the backstory to Sandworm is quite remarkable. Attacks by Russia against Ukraine are just the latest in a long history of Russian aggression.

Greenberg’s work is certainly remarkable. This provides deep storylines linking Russia to NotPetya, a ransomware attack launched against Ukraine in 2016. Elements of this attack were initially launched as reconnaissance in the prior year.

At the same time, Greenberg provides amazing details regarding cyber attacks Moonlight Maze, Operation Aurora on America by Russia and China.

Indeed Sandworm provides a historical view between Russia and Ukraine upon the heels of World War II.

Harvest of Sorrow

In this period, Stalin produced a truely horrific famine across Ukraine. Unquestionably, the exploitation of Ukraine by the Soviet Union and Hitler’s Germany resulted in the torture and death of millions of Ukrainians. Greenberg notes the unbelievable but true horror by author Anne Applebaum in Red Famine: Stalin’s War on Ukraine:

“stories of desperate peasants resorting to eating leather and rodents, grass, and, in states of starvation-induced mania, even their own children. All of this occurred in one of the most fertile grain-production regions in the world.”

Red Famine by Anne Applebaum

In addition, these horrific attacks are echoed in Harvest of Sorrow by Soviet scholar Robert Conquest. Red Famine’s lessons provide a razor sharp backdrop to Russia’s invasion of Ukraine following the 2014 Winter Olympics in Sochi. This is only the latest attack in a long confrontation between Russia and Ukraine.

Categories
Cyberinfrastructure Education Flat World Globalization Innovation Network OpenSource Reading Technology

Latest Read: Countdown to Zero Day

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon by Kim Zetter is an amazing story. The NSA and Mossad worked to derail the nuclear weapons program of Iran. This begins an amazing story regarding stuxnet. In the end this is a wonderful story about imagination.

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

The history Kim traces is deeper than anyone could first imagine. Think about your favorite spy movie and technology. Countdown to Zero Day is going to shake you up as I found this book difficult to put down.

The International Atomic Energy Agency learned that centrifuges at an enrichment plant in Natanz were failing at an unprecedented rate. The US and Israel were able to deploy Stuxnet to Siemens industrial control systems in Iran.

Zetter opens this story in Belarus. A computer security firm with customers in Iran found what they initially thought was a rootkit. The virus was causing systems to repeatedly crash and reboot. When they could not resolve the issue they called Sergey Ulasen.