'Zero Days' - Hidden World of Cyber Warfare

Oscar-winner Alex Gibney flawlessly spins what could have been a tech-talk heavy bore into an enthralling espionage thriller complete with the assassinations of Iranian nuclear scientists and an arsenal of bits and bytes every bit as lethal as terrorists packing bombs and AR-15s.

New from the crazy uncle who unwittingly armed his enemies in Iran, Iraq and Afghanistan comes Stuxnet, the computer worm that just might replace the H-bomb as the thing we fear more than fear itself. 

Oscar-winner Alex Gibney, whose chilling documentary, “Zero Days,” rivetingly chronicles how Uncle Sam outsmarted himself by inadvertently providing our enemies a new weapon to turn against us. Who knew binary code could be so deadly?

Certainly not the folk at NSA, CIA and the various US alphabet agencies who conspired with Israeli “intelligence” to design, code and unleash the self-replicating Stuxnet malware on enough computers for it to eventually be intercepted and turned right back on our nation’s fragile cyber infrastructures. In other words, giving our not-so-good friends in Russia, Iran, China and North Korea the power to wipe out our power grids, financial systems and air-traffic controls with a few dozen strategic keystrokes.

Panic might be a little premature, but it won’t be if we don’t start treating cyberwarfare the same way we do nukes by forging treaties and setting rules of engagement. That’s the hope of prominent U.S. spymasters like Richard Clarke and Gen. Michael Hayden, the former chief of both the CIA and NSA. They are among the dozen or so experts Gibney interviews in his quest to root out the origins of Stuxnet, its untimely unfurling and its long-term effects on how we might wage war in the 21st century.

Their observations, and those of a spooky Max Headroom-type hologram collectively dishing out top-secret info leaked by a smattering of unnamed whistle-blowers inside the NSA, will scare the bejesus out of you. But the beauty of Gibney, the genius behind classic docs like “Taxi to the Dark Side,” “Going Clear,” “Steve Jobs,” “Enron: The Smartest Guys in the Room” and “Client 9,” is his ability to make his relentless muckraking shamefully entertaining, even generating laughs among the doomsday predictions. Even better is his brilliant use of pictures and graphics to make an incredibly complex subject almost easy to understand, particularly in how Stuxnet was devised to anonymously attack the rapidly spinning centrifuges in Iran’s heavily fortified fuel-enrichment plant in Natanz.

No digital clock counting down? Not with Stuxnet and its even more powerful successor, Nitro Zeus. They are malware that frighteningly strike silently and without warning.

The first thing Gibney’s array of experts stress is moving cyber-warfare out of the shadows and into the light, by having Western intelligence organizations admit that such programs exist and then open a worldwide dialogue on controlling it so – like nukes – we don’t end up on the verge of destroying Earth.

As General Hayden says, like 1945, we’ve opened a Pandora’s Box, and there’s no chance of ever putting the lid back. No thanks to the Stuxnet inventors, we must learn to live with it. And how we choose to do that will greatly determine if we live free, or at the mercy of these “cyber armies” who could well be the deaths of us all.

Ein News

« Ransomware Victims Run Into Millions
Improved Security For The Internet-of-Things »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

4Secure

4Secure

4Secure is a cyber security company providing services and solutions to counter and respond to the most sophisticated and targeted cyber threats.

Exonar

Exonar

We enable organisations to better organise their information, removing risk and making it more productive and secure.

Information Technology Industry Development Agency (ITIDA)

Information Technology Industry Development Agency (ITIDA)

ITIDA has two broad goals: building the capacities of Egypt’s local information and communications technology (ICT) industry and attracting foreign direct investments to boost the ICT sector.

Aspen Insurance

Aspen Insurance

Aspen is a leading diversified specialty insurance and reinsurance company. Products offered include cyber insurance.

ioXt Alliance

ioXt Alliance

The ioXt Alliance is a group of manufacturers, industry alliances and government organizations dedicated to harmonizing best security practices in a highly connected world.

IntelligInts

IntelligInts

IntelligInts provide 24×7 threat monitoring, hunting, alerting, and mitigation in our world class Security Operations Center.

Corsha

Corsha

Corsha is on a mission to simplify API security and allow enterprises to embrace modernization, complex deployments, and hybrid environments with confidence.

Alias Robotics

Alias Robotics

Alias Robotics is a robot cyber security company. We deliver cyber security solutions for robots and robot components.

SecureAge Technology

SecureAge Technology

We’re a rapidly growing cybersecurity company with an 18-year history of ZERO Data breaches. Our security solutions place security and usability on equal footing. Learn more about our technology.

BreachQuest

BreachQuest

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents.

Deeper Network

Deeper Network

Deeper Network represents the world's first decentralized blockchain network for building a truly private, secure and fair Internet.

Verica

Verica

Verica uses chaos engineering to make systems more secure and less vulnerable to costly incidents.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

OryxLabs

OryxLabs

OryxLabs provide advanced enterprise digital risk protection solutions. Learn more about how 24x7 continuous assessment, monitoring, and improvement can secure your network.

Verinext

Verinext

Verinext delivers transformative business technology, from intelligently automating time-consuming tasks and protecting data assets to securing infrastructure and improving customer experiences.

TrueBees

TrueBees

TrueBees is the first deepfakes detector able to detect AI-generated portraits shared on social media and to prevent their diffusion across the web.