The Secret History of Cyber War

Whilst it complains of the level and persistence of foreign cyber attacks against business and government agencies, the fact is, the US started it.

 At least, tat's one of the central thrusts of Fred Kaplan's "Dark Territory: The Secret History of Cyber War." Because it pioneered computing, the U.S. intelligence agencies enjoyed decades of dominance over rivals, and even learned how to remotely wreak havoc on, say, the Iranian nuclear program. But because nearly everything in our country is networked, we're uniquely vulnerable now that the rest of the world has caught up.

"If America, or US Cyber Command, wanted to wage cyber war," Kaplan writes, "it would do so from inside a glass house."

You heard echoes of breaking glass when federal prosecutors in Pittsburgh indicted five members of People's Liberation Army Unit 61398 for stealing secrets from Alcoa, US Steel and Westinghouse Electric. Also when North Korea, presumably, hacked and humiliated Sony. And did you know that Iran remotely ruined 20,000 computers owned by Las Vegas Sands Corp.?

The line between old-school espionage and cyber-sabotage blurred gradually over the past quarter century, Kaplan tells us, starting with 1991's Operation Desert Storm, in which American intelligence hacked into Iraq's air defense system.

Six years later, the Pentagon's J-39 unit was able to remotely switch off Serbia's government-controlled TV stations at key moments, hack Slobodan Milosevic's radar systems and relentlessly prank call his top aides.

And during the past decade, we sent Iraqi insurgents emails that seemed to be from trusted friends, much like the phishing messages we delete every day. But whereas our fake friends who are stranded in the Philippines just want our money, our emails to the jihadis told them to rendezvous with each other - and when they did, we killed them.

By 1998, though, hackers were penetrating the network at Andrews Air Force Base. Those intrusions were traced to high school students in California. But later analysis of other cyberespionage attacks showed that the malicious code was initially typed on Cyrillic keyboards, suggesting that Russia was in the game.

That's when, according to "Dark Territory," the National Security Agency came to the conclusion that the best defense was a good offense. When Pittsburgh native Michael Hayden led the NSA from 1999 to 2005, its guiding philosophy, according to Kaplan, was that "the best way to defend a network was to learn an adversary's plans for attack - which required getting inside his network."

The ultimate intrusion was the well-reported Operation Olympic Games, in which the US planted a 650,000-line hunk of malware, later dubbed Stuxnet, into the computers controlling the Iranian nuclear reactor at Natanz. The clever code shattered thousands of centrifuges and added years of headaches to the Iranian bid for weapons-grade uranium.

As the first cyber-operation to disrupt real-world infrastructure, Olympic Games was the information-age equivalent of the Hiroshima bombing, Kaplan argues. The difference: Nuclear weapons haven't been used since 1945.

By contrast, the Iranians have hacked American interests in Saudi Arabia. The North Koreans have launched denial-of-service attacks against South Korea and Wall Street. The Russians shut down the online infrastructure of West-leaning Estonia and Georgia. The Chinese, apparently, snatched the personal information of 21.5 million Americans who have applied for security clearances.

Kaplan, a Slate columnist and veteran of The Boston Globe, is deeply sourced. Luckily, he's not slavishly loyal to his sources: He deals dispassionately with the struggle, before and after Edward Snowden, to balance anti-terror measures and personal privacy.

The fun stuff? Details of meetings between top intelligence officials and hackers with nicknames like Mudge and Space Rogue. The dull stuff? Play-by-play accounts of federal task forces. The takeaway? "Anything we're doing to them," writes Kaplan, "they can do to us."

Ein News

« US National Cybersecurity Plan Costs $19b
NATO Tools Up For Cybewar »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

National Cyber Security Centre (NKSC) - Lithuania

National Cyber Security Centre (NKSC) - Lithuania

NKSC is the main Lithuanian cyber security institution, responsible for unified management of cyber incidents, monitoring and control of the implementation of cyber security requirements.

MKD-CIRT

MKD-CIRT

MKD-CIRT is the national Computer Incident Response Team for Macedonia.

Repository of Industrial Security Incidents (RISI)

Repository of Industrial Security Incidents (RISI)

RISI is a database of cyber security incidents that have (or could have) affected process control, industrial automation or SCADA systems.

Procilon Group

Procilon Group

Procilon Group specialize in the development of cryptographic software as well as strategic advice on information security and data protection.

R3

R3

R3 is an enterprise blockchain software firm working with a broad ecosystem of more than 300 participants across multiple industries to develop blockchain applications.

Norwest Venture Partners (NVP)

Norwest Venture Partners (NVP)

Norwest Venture Partners offer entrepreneurs a broad range of services to help them build their businesses at every stage of growth. Key sectors include AI, Infrastructure, SaaS and Security.

Variti

Variti

Variti Intelligent Active Bot Protection technology — traffic analysis, detection and stopping of malicious bots in real-time and effective response to DDoS attacks.

Onfido

Onfido

Onfido is building the new identity standard for the internet. We digitally prove people’s real identities using a photo ID and facial biometrics.

A&O IT Group

A&O IT Group

A&O IT Group provide IT support and services including IT Managed Services, IT Project Services, IT Engineer Services and Cyber Security.

Guernsey

Guernsey

Guernsey provides a wide range of engineering, architecture and consulting services to multiple markets, including cybersecurity consulting and CMMC certification.

Digital Edge

Digital Edge

Digital Edge provides unparalleled Managed Cloud Solutions, as well as superior Information Technology Support Services.

Finesse Global

Finesse Global

Finesse is a global system integration and digital business transformation company.

Casepoint

Casepoint

Casepoint is the legal technology platform of choice for corporations, government agencies, and law firms to meet their complex eDiscovery, investigations, and compliance needs.

M.Tech

M.Tech

M.Tech is a leading cyber security and network performance solutions provider. We work with leading vendors to bring optimal solutions to the market through a channel of reseller partners.

DHCO IT

DHCO IT

The DHCO IT team are experts in IT support, cyber security, cloud support and disaster recovery, and are Microsoft 365 partners.

Nihka Technology Group

Nihka Technology Group

Nihka offers full end-to-end ICT solutions from business optimisation, data centre modernisation, cloud connection and management, and ICT security.