'Zero Days' - Hidden World of Cyber Warfare

Oscar-winner Alex Gibney flawlessly spins what could have been a tech-talk heavy bore into an enthralling espionage thriller complete with the assassinations of Iranian nuclear scientists and an arsenal of bits and bytes every bit as lethal as terrorists packing bombs and AR-15s.

New from the crazy uncle who unwittingly armed his enemies in Iran, Iraq and Afghanistan comes Stuxnet, the computer worm that just might replace the H-bomb as the thing we fear more than fear itself. 

Oscar-winner Alex Gibney, whose chilling documentary, “Zero Days,” rivetingly chronicles how Uncle Sam outsmarted himself by inadvertently providing our enemies a new weapon to turn against us. Who knew binary code could be so deadly?

Certainly not the folk at NSA, CIA and the various US alphabet agencies who conspired with Israeli “intelligence” to design, code and unleash the self-replicating Stuxnet malware on enough computers for it to eventually be intercepted and turned right back on our nation’s fragile cyber infrastructures. In other words, giving our not-so-good friends in Russia, Iran, China and North Korea the power to wipe out our power grids, financial systems and air-traffic controls with a few dozen strategic keystrokes.

Panic might be a little premature, but it won’t be if we don’t start treating cyberwarfare the same way we do nukes by forging treaties and setting rules of engagement. That’s the hope of prominent U.S. spymasters like Richard Clarke and Gen. Michael Hayden, the former chief of both the CIA and NSA. They are among the dozen or so experts Gibney interviews in his quest to root out the origins of Stuxnet, its untimely unfurling and its long-term effects on how we might wage war in the 21st century.

Their observations, and those of a spooky Max Headroom-type hologram collectively dishing out top-secret info leaked by a smattering of unnamed whistle-blowers inside the NSA, will scare the bejesus out of you. But the beauty of Gibney, the genius behind classic docs like “Taxi to the Dark Side,” “Going Clear,” “Steve Jobs,” “Enron: The Smartest Guys in the Room” and “Client 9,” is his ability to make his relentless muckraking shamefully entertaining, even generating laughs among the doomsday predictions. Even better is his brilliant use of pictures and graphics to make an incredibly complex subject almost easy to understand, particularly in how Stuxnet was devised to anonymously attack the rapidly spinning centrifuges in Iran’s heavily fortified fuel-enrichment plant in Natanz.

No digital clock counting down? Not with Stuxnet and its even more powerful successor, Nitro Zeus. They are malware that frighteningly strike silently and without warning.

The first thing Gibney’s array of experts stress is moving cyber-warfare out of the shadows and into the light, by having Western intelligence organizations admit that such programs exist and then open a worldwide dialogue on controlling it so – like nukes – we don’t end up on the verge of destroying Earth.

As General Hayden says, like 1945, we’ve opened a Pandora’s Box, and there’s no chance of ever putting the lid back. No thanks to the Stuxnet inventors, we must learn to live with it. And how we choose to do that will greatly determine if we live free, or at the mercy of these “cyber armies” who could well be the deaths of us all.

Ein News

« Ransomware Victims Run Into Millions
Improved Security For The Internet-of-Things »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MarQuest

MarQuest

MarQuest provides services and systems to enhance network reliability and security.

Backup Technology

Backup Technology

Backup Technology is a world leader in the Online Cloud Backup, Disaster Recovery and Business Continuity market.

Cologix

Cologix

Cologix provides reliable, secure, scalable data center and interconnection solutions from 24 prime interconnection locations across 9 strategic North American edge markets.

Rhebo

Rhebo

Rhebo Industrial Protector monitors and ensures the continuous, correct, and predictable operation of real-time Industrial Control Systems to prevent outages and reduce downtimes.

Malomatia

Malomatia

Malomatia is a leading provider of technology services and solutions in Qatar including information security.

Comarch

Comarch

Comarch is a provider of IT business solutions to optimize operational and business processes. Cyber security solutions are focused on Identity Management and Security Assessment services.

ISMS Accreditation Center (ISMS-AC)

ISMS Accreditation Center (ISMS-AC)

ISMS-AC is the national accreditation body for Japan. The directory of members provides details of organisations offering certification services for ISO 27001.

Abnormal Security

Abnormal Security

Abnormal is an API-based email security platform providing protection against the entire spectrum of targeted email attacks.

Tesserent

Tesserent

Tesserent (formerly Pure Security) is a full-service cybersecurity solutions provider. We partner with clients across Australia and New Zealand in the protection of their digital assets.

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

Softcat

Softcat

Softcat offer a broad portfolio of IT services and solutions covering Hybrid Infrastructure, Cyber Security, Digital Workspace and IT Intelligence.

AlJammaz Technologies

AlJammaz Technologies

AlJammaz Technologies is the leading Technology Value-Added Distributor, which distributes advanced technology products, solutions and services in area including networking and cybersecurity.

Redhorse

Redhorse

Redhorse provides top-tier consulting to help clients address mission-critical government problems in National Security, Networking Technology, Energy and the Environment.

Cyber Security Works (CSW)

Cyber Security Works (CSW)

Cyber Security Works is your organization’s early cybersecurity warning system to help prevent attacks before they happen.

ExtraHop

ExtraHop

ExtraHop's dynamic cyber defense platform uses cloud-scale AI to help enterprises detect and respond to advanced threats - before they compromise your business.

Dev Information Technology (DEV IT)

Dev Information Technology (DEV IT)

DEV IT is a leading IT solutions and services company. We deliver digital transformation and end-to-end IT services, from advisory to execution.