Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter
Author:Kim Zetter [Zetter, Kim]
Language: eng
Format: epub, mobi, azw3
ISBN: 9780770436186
Publisher: Crown Publishing Group
Published: 2014-11-10T18:30:00+00:00
* * *
1 John Arquilla and David Ronfeldt, “Cyberwar Is Coming!” published by RAND in 1993 and reprinted as chapter 2 in Arquilla and Ronfeldt’s book In Athena’s Camp: Preparing for Conflict in the Information Age (RAND, 1997).
2 He was speaking to PBS Frontline in 2003 for its show “CyberWar!” Interview available at pbs.org/wgbh/pages/frontline/shows/cyberwar/interviews/arquilla.html.
3 The operation was thwarted by a system administrator named Cliff Stoll, who stumbled upon the intrusion while investigating the source of a seventy-five-cent billing discrepancy. Stoll recounts the story in his now-classic book The Cuckoo’s Egg: Tracking a Spy Through a Maze of Computer Espionage (New York: Doubleday, 1989).
4 Jonathan Ungoed-Thomas, “How Datastream Cowboy Took U.S. to the Brink of War,” Toronto Star, January 1, 1998.
5 Information warfare didn’t just involve offensive and defensive cyber operations, it also included psychological operations, electronic warfare, and physical destruction of information targets.
6 A thirty-nine-page book recounts the history of the 609th. A copy of the book, titled 609 IWS: A Brief History Oct. 1995–June 1999, was obtained under a FOIA request and is available at securitycritics.org/wp-content/uploads/2006/03/hist-609.pdf.
7 John “Soup” Campbell speaking as part of a panel titled “Lessons from Our Cyber Past: The First Military Cyber Units,” at the Atlantic Council, March 5, 2012. Campbell was the first commander of the Joint Task Force-Computer Network Defense in December 1998 and later was principal adviser to the CIA director on military issues. A transcript of the panel discussion can be found at atlanticcouncil.org/news/transcripts/transcript-lessons-from-our-cyber-past-the-first-military-cyber-units.
8 Bradley Graham, “U.S. Studies a New Threat: Cyber Attack,” Washington Post, May 24, 1998.
9 Ibid.
10 Some of the information about the first task force and the history of the military’s cyber activities comes from a March 2012 interview with Jason Healey, head of the Cyber Statecraft Initiative at the Atlantic Council in Washington, DC, and an original member of the military’s first cyber taskforce. Healey also recounts some of the history of cyber conflict in a book he edited, which is one of the first to examine it. See A Fierce Domain: Conflict in Cyberspace, 1986 to 2012 (Cyber Conflict Studies Association, 2013).
11 Maj. Gen. James D. Bryan, founding commander of the JTF-Computer Network Operations, speaking on the panel “Lessons from Our Cyber Past: The First Military Cyber Units.”
12 This and other quotes from Sachs come from author interview, March 2012.
13 “HOPE” stands for Hackers on Planet Earth.
14 Electronic warfare, which dates to World War I, involves the use of electromagnetic and directed energy to control the electromagnetic spectrum to retard enemy systems. Computer network attacks, by contrast, are defined as operations designed to disrupt, deny, degrade, or destroy information resident on computers and computer networks, or the computers or networks themselves, according to Department of Defense Directive 3600.1.
15 Author redacted, “IO, IO, It’s Off to Work We Go,” Cryptolog: The Journal of Technical Health (Spring 1997): 9. Cryptolog is an internal classified quarterly newsletter produced by and for NSA employees that includes everything from book reviews to employee profiles to technical articles about topics of interest. In
Download
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter.mobi
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter.azw3
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Elections & Political Process | Ideologies & Doctrines |
International & World Politics | Political Science |
Public Affairs & Policy | Specific Topics |
United States |
The Secret History by Donna Tartt(18082)
The Social Justice Warrior Handbook by Lisa De Pasquale(11941)
Thirteen Reasons Why by Jay Asher(8414)
This Is How You Lose Her by Junot Diaz(6409)
Weapons of Math Destruction by Cathy O'Neil(5798)
Zero to One by Peter Thiel(5459)
Beartown by Fredrik Backman(5304)
The Myth of the Strong Leader by Archie Brown(5215)
The Fire Next Time by James Baldwin(4998)
How Democracies Die by Steven Levitsky & Daniel Ziblatt(4940)
Promise Me, Dad by Joe Biden(4898)
Stone's Rules by Roger Stone(4831)
100 Deadly Skills by Clint Emerson(4660)
Rise and Kill First by Ronen Bergman(4535)
A Higher Loyalty: Truth, Lies, and Leadership by James Comey(4532)
The David Icke Guide to the Global Conspiracy (and how to end it) by David Icke(4359)
Secrecy World by Jake Bernstein(4354)
The Farm by Tom Rob Smith(4303)
The Doomsday Machine by Daniel Ellsberg(4230)
