The Secret History of Cyber War

Whilst it complains of the level and persistence of foreign cyber attacks against business and government agencies, the fact is, the US started it.

 At least, tat's one of the central thrusts of Fred Kaplan's "Dark Territory: The Secret History of Cyber War." Because it pioneered computing, the U.S. intelligence agencies enjoyed decades of dominance over rivals, and even learned how to remotely wreak havoc on, say, the Iranian nuclear program. But because nearly everything in our country is networked, we're uniquely vulnerable now that the rest of the world has caught up.

"If America, or US Cyber Command, wanted to wage cyber war," Kaplan writes, "it would do so from inside a glass house."

You heard echoes of breaking glass when federal prosecutors in Pittsburgh indicted five members of People's Liberation Army Unit 61398 for stealing secrets from Alcoa, US Steel and Westinghouse Electric. Also when North Korea, presumably, hacked and humiliated Sony. And did you know that Iran remotely ruined 20,000 computers owned by Las Vegas Sands Corp.?

The line between old-school espionage and cyber-sabotage blurred gradually over the past quarter century, Kaplan tells us, starting with 1991's Operation Desert Storm, in which American intelligence hacked into Iraq's air defense system.

Six years later, the Pentagon's J-39 unit was able to remotely switch off Serbia's government-controlled TV stations at key moments, hack Slobodan Milosevic's radar systems and relentlessly prank call his top aides.

And during the past decade, we sent Iraqi insurgents emails that seemed to be from trusted friends, much like the phishing messages we delete every day. But whereas our fake friends who are stranded in the Philippines just want our money, our emails to the jihadis told them to rendezvous with each other - and when they did, we killed them.

By 1998, though, hackers were penetrating the network at Andrews Air Force Base. Those intrusions were traced to high school students in California. But later analysis of other cyberespionage attacks showed that the malicious code was initially typed on Cyrillic keyboards, suggesting that Russia was in the game.

That's when, according to "Dark Territory," the National Security Agency came to the conclusion that the best defense was a good offense. When Pittsburgh native Michael Hayden led the NSA from 1999 to 2005, its guiding philosophy, according to Kaplan, was that "the best way to defend a network was to learn an adversary's plans for attack - which required getting inside his network."

The ultimate intrusion was the well-reported Operation Olympic Games, in which the US planted a 650,000-line hunk of malware, later dubbed Stuxnet, into the computers controlling the Iranian nuclear reactor at Natanz. The clever code shattered thousands of centrifuges and added years of headaches to the Iranian bid for weapons-grade uranium.

As the first cyber-operation to disrupt real-world infrastructure, Olympic Games was the information-age equivalent of the Hiroshima bombing, Kaplan argues. The difference: Nuclear weapons haven't been used since 1945.

By contrast, the Iranians have hacked American interests in Saudi Arabia. The North Koreans have launched denial-of-service attacks against South Korea and Wall Street. The Russians shut down the online infrastructure of West-leaning Estonia and Georgia. The Chinese, apparently, snatched the personal information of 21.5 million Americans who have applied for security clearances.

Kaplan, a Slate columnist and veteran of The Boston Globe, is deeply sourced. Luckily, he's not slavishly loyal to his sources: He deals dispassionately with the struggle, before and after Edward Snowden, to balance anti-terror measures and personal privacy.

The fun stuff? Details of meetings between top intelligence officials and hackers with nicknames like Mudge and Space Rogue. The dull stuff? Play-by-play accounts of federal task forces. The takeaway? "Anything we're doing to them," writes Kaplan, "they can do to us."

Ein News

« US National Cybersecurity Plan Costs $19b
NATO Tools Up For Cybewar »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Hex Security

Hex Security

Hex Security Limited is a specialist Information Assurance (IA) consultancy working with associates and partners to deliver security certification and accreditation support.

Link11 GmbH

Link11 GmbH

Link11 provides DDoS protection solutions to protect websites and complete server infrastructures from DDoS attacks.

Actiphy

Actiphy

Actiphy provides a tried and proven backup and disaster recovery software solution to ensure business continuity at all times.

Wireless Logic

Wireless Logic

Wireless Logic delivers a range of secure and resilient value-added M2M/IoT managed services that empower remote devices to communicate cost-effectively, two ways.

Altron

Altron

Altron provides locally relevant innovative and integrated ICT solutions to business, government and consumers.

Oznet Cyber Security

Oznet Cyber Security

Oznet Cyber Security is dedicated to offering integral solutions oriented to the support and security of information.

Chronicle

Chronicle

Chronicle products combine intelligence about global threats in the wild, threats inside your network, and unique signals about both.

PeopleSec

PeopleSec

PeopleSec specializes in the human element of cybersecurity with a comprehensive set of services designed to maximize your security by educating your workforce as a whole.

German Accelerator

German Accelerator

German Accelerator supports high-potential German startups in successfully entering the U.S. and Southeast Asian markets.

spiderSilk

spiderSilk

spiderSilk is a Dubai-based cybersecurity firm, specializing in simulating the most advanced cyber offenses on your technology so you can build your best security defenses.

ACA Group

ACA Group

ACA Group are a leading governance, risk, and compliance (GRC) advisor in financial services.

Servian

Servian

Servian is one of Australia's leading IT consultancies, with expertise in cloud, data, machine learning, DevOps and cybersecurity.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

Tidelift

Tidelift

Tidelift provides the tools, data, and strategies that help organizations assess risk and improve the health, security, and resilience of the open source used in their applications.

Cypheria

Cypheria

Cypheria harness the expertise of elite military units and combine it with extensive digital combat experience to deliver unparalleled security solutions for organizations.

Cyberscope

Cyberscope

Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments.