'Zero Days' - Hidden World of Cyber Warfare

Oscar-winner Alex Gibney flawlessly spins what could have been a tech-talk heavy bore into an enthralling espionage thriller complete with the assassinations of Iranian nuclear scientists and an arsenal of bits and bytes every bit as lethal as terrorists packing bombs and AR-15s.

New from the crazy uncle who unwittingly armed his enemies in Iran, Iraq and Afghanistan comes Stuxnet, the computer worm that just might replace the H-bomb as the thing we fear more than fear itself. 

Oscar-winner Alex Gibney, whose chilling documentary, “Zero Days,” rivetingly chronicles how Uncle Sam outsmarted himself by inadvertently providing our enemies a new weapon to turn against us. Who knew binary code could be so deadly?

Certainly not the folk at NSA, CIA and the various US alphabet agencies who conspired with Israeli “intelligence” to design, code and unleash the self-replicating Stuxnet malware on enough computers for it to eventually be intercepted and turned right back on our nation’s fragile cyber infrastructures. In other words, giving our not-so-good friends in Russia, Iran, China and North Korea the power to wipe out our power grids, financial systems and air-traffic controls with a few dozen strategic keystrokes.

Panic might be a little premature, but it won’t be if we don’t start treating cyberwarfare the same way we do nukes by forging treaties and setting rules of engagement. That’s the hope of prominent U.S. spymasters like Richard Clarke and Gen. Michael Hayden, the former chief of both the CIA and NSA. They are among the dozen or so experts Gibney interviews in his quest to root out the origins of Stuxnet, its untimely unfurling and its long-term effects on how we might wage war in the 21st century.

Their observations, and those of a spooky Max Headroom-type hologram collectively dishing out top-secret info leaked by a smattering of unnamed whistle-blowers inside the NSA, will scare the bejesus out of you. But the beauty of Gibney, the genius behind classic docs like “Taxi to the Dark Side,” “Going Clear,” “Steve Jobs,” “Enron: The Smartest Guys in the Room” and “Client 9,” is his ability to make his relentless muckraking shamefully entertaining, even generating laughs among the doomsday predictions. Even better is his brilliant use of pictures and graphics to make an incredibly complex subject almost easy to understand, particularly in how Stuxnet was devised to anonymously attack the rapidly spinning centrifuges in Iran’s heavily fortified fuel-enrichment plant in Natanz.

No digital clock counting down? Not with Stuxnet and its even more powerful successor, Nitro Zeus. They are malware that frighteningly strike silently and without warning.

The first thing Gibney’s array of experts stress is moving cyber-warfare out of the shadows and into the light, by having Western intelligence organizations admit that such programs exist and then open a worldwide dialogue on controlling it so – like nukes – we don’t end up on the verge of destroying Earth.

As General Hayden says, like 1945, we’ve opened a Pandora’s Box, and there’s no chance of ever putting the lid back. No thanks to the Stuxnet inventors, we must learn to live with it. And how we choose to do that will greatly determine if we live free, or at the mercy of these “cyber armies” who could well be the deaths of us all.

Ein News

« Ransomware Victims Run Into Millions
Improved Security For The Internet-of-Things »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Intrinsic-ID

Intrinsic-ID

Intrinsic-ID's authentication technology creates unique IDs and keys to authenticate chips, data, devices and systems.

CloudSigma

CloudSigma

CloudSigma, a pure-cloud IaaS provider offers flexible and innovative cloud hosting solutions for companies of all sizes both in Europe and the US.

MailGuard

MailGuard

MailGuard delivers a full suite of security solutions across email and web to protect your business before threats reach your environment.

Deltagon

Deltagon

Deltagon develops information security solutions to protect companies’ confidential information in e-communication and e-services.

Trust in Digital Life (TDL)

Trust in Digital Life (TDL)

TDL is a membership association comprising companies, SMEs, universities and research institutes who exchange experience and insights to make digital services in Europe trustworthy and safe.

4N6

4N6

4N6 is a privately-owned firm founded with the goal of providing expert knowledge of computer forensics.

Luxembourg Institute of Science & Technology (LIST)

Luxembourg Institute of Science & Technology (LIST)

LIST is a mission-driven Research and Technology Organisation. Areas of research include IT and aspects of IT security.

Cybercrime Support Network (CSN)

Cybercrime Support Network (CSN)

CSN is a public-private, nonprofit collaboration created to meet the challenges facing millions of individuals and businesses affected each and every day by cybercrime.

ADL Process

ADL Process

ADL Process offer secure data destruction, certified product destruction and responsible electronics recycling services to businesses and institutions.

Ten Eleven Ventures

Ten Eleven Ventures

Ten Eleven is a specialized venture capital firm exclusively dedicated to helping cybersecurity companies thrive.

Tehtris

Tehtris

TEHTRIS XDR Platform was developed to control and improve the IT security of private and public companies against advanced cyber threats such as cyber espionage or cyber sabotage activities.

Centre for Cyber Security Belgium (CCB)

Centre for Cyber Security Belgium (CCB)

The Centre for Cyber Security Belgium is the central authority for cyber security in Belgium.

Goldilock

Goldilock

Goldilock is redefining how sensitive data, devices, networks and critical infrastructure can be secured.

Silent Push

Silent Push

Silent Push maps all internet-facing infrastructure with searchable, advanced attributes, generating early indicators of potential threats that are tailored to your environment.

PRE Security

PRE Security

PRE Security is leading the transition into the next era of AI cybersecurity with a new model: Predict & Prevent.

Maverits

Maverits

At Maverits, we are on a mission to reshape the cybersecurity landscape. We offer a wide range of services, including Threat Intelligence, Incident Response, Consulting & Training.