'Zero Days' - Hidden World of Cyber Warfare

Oscar-winner Alex Gibney flawlessly spins what could have been a tech-talk heavy bore into an enthralling espionage thriller complete with the assassinations of Iranian nuclear scientists and an arsenal of bits and bytes every bit as lethal as terrorists packing bombs and AR-15s.

New from the crazy uncle who unwittingly armed his enemies in Iran, Iraq and Afghanistan comes Stuxnet, the computer worm that just might replace the H-bomb as the thing we fear more than fear itself. 

Oscar-winner Alex Gibney, whose chilling documentary, “Zero Days,” rivetingly chronicles how Uncle Sam outsmarted himself by inadvertently providing our enemies a new weapon to turn against us. Who knew binary code could be so deadly?

Certainly not the folk at NSA, CIA and the various US alphabet agencies who conspired with Israeli “intelligence” to design, code and unleash the self-replicating Stuxnet malware on enough computers for it to eventually be intercepted and turned right back on our nation’s fragile cyber infrastructures. In other words, giving our not-so-good friends in Russia, Iran, China and North Korea the power to wipe out our power grids, financial systems and air-traffic controls with a few dozen strategic keystrokes.

Panic might be a little premature, but it won’t be if we don’t start treating cyberwarfare the same way we do nukes by forging treaties and setting rules of engagement. That’s the hope of prominent U.S. spymasters like Richard Clarke and Gen. Michael Hayden, the former chief of both the CIA and NSA. They are among the dozen or so experts Gibney interviews in his quest to root out the origins of Stuxnet, its untimely unfurling and its long-term effects on how we might wage war in the 21st century.

Their observations, and those of a spooky Max Headroom-type hologram collectively dishing out top-secret info leaked by a smattering of unnamed whistle-blowers inside the NSA, will scare the bejesus out of you. But the beauty of Gibney, the genius behind classic docs like “Taxi to the Dark Side,” “Going Clear,” “Steve Jobs,” “Enron: The Smartest Guys in the Room” and “Client 9,” is his ability to make his relentless muckraking shamefully entertaining, even generating laughs among the doomsday predictions. Even better is his brilliant use of pictures and graphics to make an incredibly complex subject almost easy to understand, particularly in how Stuxnet was devised to anonymously attack the rapidly spinning centrifuges in Iran’s heavily fortified fuel-enrichment plant in Natanz.

No digital clock counting down? Not with Stuxnet and its even more powerful successor, Nitro Zeus. They are malware that frighteningly strike silently and without warning.

The first thing Gibney’s array of experts stress is moving cyber-warfare out of the shadows and into the light, by having Western intelligence organizations admit that such programs exist and then open a worldwide dialogue on controlling it so – like nukes – we don’t end up on the verge of destroying Earth.

As General Hayden says, like 1945, we’ve opened a Pandora’s Box, and there’s no chance of ever putting the lid back. No thanks to the Stuxnet inventors, we must learn to live with it. And how we choose to do that will greatly determine if we live free, or at the mercy of these “cyber armies” who could well be the deaths of us all.

Ein News

« Ransomware Victims Run Into Millions
Improved Security For The Internet-of-Things »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

InfoSecurity Magazine

InfoSecurity Magazine

Infosecurity Magazine has over ten years of experience providing knowledge and insight into the information security industry.

Evidian

Evidian

Evidian, a Bull Group company, is the European leader and one of the major worldwide vendors of identity and access management software.

CERT-FR

CERT-FR

CERT-FR is the French national government computer security incident response team.

Gigasoft

Gigasoft

Gigasoft provide secure online data backup & cloud backup services for the education sector and businesses.

Haystax Technology

Haystax Technology

Haystax’s security analytics platform applies artificial intelligence techniques to identify and prioritize threats in real time.

GreyCastle Security

GreyCastle Security

GreyCastle Security is a leading cybersecurity services provider dedicated exclusively to cybersecurity and the practical management of cybersecurity risks.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

ICS Cyber Security Conference

ICS Cyber Security Conference

SecurityWeek’s Industrial Control Systems (ICS) Cyber Security Conference is the largest and longest-running event series focused on industrial cybersecurity.

GM Security Technologies

GM Security Technologies

GM Security Technologies provides leading managed security services of the highest quality to every type of individual and organization in Puerto Rico, Caribbean and Latin America.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

InfoSec Conferences

InfoSec Conferences

InfoSec Conferences is an online directory of infosec conferences. We list every single Information Security conference, event and seminar within every niche in Cybersecurity.

SHe CISO Exec

SHe CISO Exec

SHe CISO Exec is a sustainable global training and mentoring platform in information security and leadership.

ITSEC Asia

ITSEC Asia

ITSEC Asia works to effectively reduce exposure to information security threats and improve the effectiveness of its clients' information security management systems.

Nicoll Curtin

Nicoll Curtin

Nicoll Curtin is a global company with over 20 years of experience in connecting outstanding talent with industry leading companies within Technology, Change and Cyber Security.

Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI)

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services.