The Secret History of Cyber War

Whilst it complains of the level and persistence of foreign cyber attacks against business and government agencies, the fact is, the US started it.

 At least, tat's one of the central thrusts of Fred Kaplan's "Dark Territory: The Secret History of Cyber War." Because it pioneered computing, the U.S. intelligence agencies enjoyed decades of dominance over rivals, and even learned how to remotely wreak havoc on, say, the Iranian nuclear program. But because nearly everything in our country is networked, we're uniquely vulnerable now that the rest of the world has caught up.

"If America, or US Cyber Command, wanted to wage cyber war," Kaplan writes, "it would do so from inside a glass house."

You heard echoes of breaking glass when federal prosecutors in Pittsburgh indicted five members of People's Liberation Army Unit 61398 for stealing secrets from Alcoa, US Steel and Westinghouse Electric. Also when North Korea, presumably, hacked and humiliated Sony. And did you know that Iran remotely ruined 20,000 computers owned by Las Vegas Sands Corp.?

The line between old-school espionage and cyber-sabotage blurred gradually over the past quarter century, Kaplan tells us, starting with 1991's Operation Desert Storm, in which American intelligence hacked into Iraq's air defense system.

Six years later, the Pentagon's J-39 unit was able to remotely switch off Serbia's government-controlled TV stations at key moments, hack Slobodan Milosevic's radar systems and relentlessly prank call his top aides.

And during the past decade, we sent Iraqi insurgents emails that seemed to be from trusted friends, much like the phishing messages we delete every day. But whereas our fake friends who are stranded in the Philippines just want our money, our emails to the jihadis told them to rendezvous with each other - and when they did, we killed them.

By 1998, though, hackers were penetrating the network at Andrews Air Force Base. Those intrusions were traced to high school students in California. But later analysis of other cyberespionage attacks showed that the malicious code was initially typed on Cyrillic keyboards, suggesting that Russia was in the game.

That's when, according to "Dark Territory," the National Security Agency came to the conclusion that the best defense was a good offense. When Pittsburgh native Michael Hayden led the NSA from 1999 to 2005, its guiding philosophy, according to Kaplan, was that "the best way to defend a network was to learn an adversary's plans for attack - which required getting inside his network."

The ultimate intrusion was the well-reported Operation Olympic Games, in which the US planted a 650,000-line hunk of malware, later dubbed Stuxnet, into the computers controlling the Iranian nuclear reactor at Natanz. The clever code shattered thousands of centrifuges and added years of headaches to the Iranian bid for weapons-grade uranium.

As the first cyber-operation to disrupt real-world infrastructure, Olympic Games was the information-age equivalent of the Hiroshima bombing, Kaplan argues. The difference: Nuclear weapons haven't been used since 1945.

By contrast, the Iranians have hacked American interests in Saudi Arabia. The North Koreans have launched denial-of-service attacks against South Korea and Wall Street. The Russians shut down the online infrastructure of West-leaning Estonia and Georgia. The Chinese, apparently, snatched the personal information of 21.5 million Americans who have applied for security clearances.

Kaplan, a Slate columnist and veteran of The Boston Globe, is deeply sourced. Luckily, he's not slavishly loyal to his sources: He deals dispassionately with the struggle, before and after Edward Snowden, to balance anti-terror measures and personal privacy.

The fun stuff? Details of meetings between top intelligence officials and hackers with nicknames like Mudge and Space Rogue. The dull stuff? Play-by-play accounts of federal task forces. The takeaway? "Anything we're doing to them," writes Kaplan, "they can do to us."

Ein News

« US National Cybersecurity Plan Costs $19b
NATO Tools Up For Cybewar »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Lumen Technologies

Lumen Technologies

Lumen is an enterprise technology platform that enables companies to capitalize on emerging applications and power the 4th Industrial Revolution (4IR).

Cyber Intelligence (CI)

Cyber Intelligence (CI)

Cyber Intelligence is an award winning 'MSC status' cyber security education and training company.

Multitel

Multitel

Multitel is an independent research centre. We develop and integrate emerging technologies into the industrial fabric at the regional and international levels.

APT Search

APT Search

APT Search is a recruitment company specialising within the Legal Technology, Cybersecurity and Privacy sectors.

Cytenna

Cytenna

Cytenna Signal is a suite of SaaS (Software-as-a-Service) products that use AI and machine learning to automatically aggregate the latest information about software vulnerabilities.

SightGain

SightGain

SightGain is the only integrated risk management solution focused on cybersecurity readiness using real-world attack simulations in your live environment.

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection Conference (HIP)

Hybrid Identity Protection (HIP) is the premier educational forum for identity-centric cybersecurity practitioners charged with defending hybrid cloud environments.

Flatt Security

Flatt Security

Flatt Security is a cyber security startup based in Japan providing security assessments and other cyber security services.

East Midlands Cyber Resilience Centre (EMCRC)

East Midlands Cyber Resilience Centre (EMCRC)

The East Midlands Cyber Resilience Centre is set up to support and help protect businesses across the region against cyber crime.

Managed IT Services

Managed IT Services

Managed IT Services is a managed IT Services Company offering a diverse range of Cyber Security services and IT solutions.

Paragon Cyber Solutions

Paragon Cyber Solutions

Paragon Cyber Solutions provides specialized security risk management and IT solutions to protect the integrity of your business operations.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

Spera Security

Spera Security

Spera helps identity security professionals effectively and confidently measure, prioritize and reduce identity risk to better protect the organization from identity-based attacks.

Digital.ai

Digital.ai

Digital.ai empowers organizations to scale software development teams, continuously deliver software with greater quality and security.

Airlock Digital

Airlock Digital

Airlock Digital was created after many years of experience in implementing whitelisting/ allowlisting solutions in Federal Government and various enterprises in Australia.

B&L PC Solutions

B&L PC Solutions

B&L PC Solutions deliver top cyber security services on Long Island and New York city to protect businesses from evolving online threats.