• Complain

A.J. Jenkinson - Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare

Here you can read online A.J. Jenkinson - Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. City: Boca Raton, year: 2021, publisher: CRC Press, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

A.J. Jenkinson Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare
  • Book:
    Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare
  • Author:
  • Publisher:
    CRC Press
  • Genre:
  • Year:
    2021
  • City:
    Boca Raton
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build the capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff, and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now.From digital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the worlds first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to todays SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The SolarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. The book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds.

A.J. Jenkinson: author's other books


Who wrote Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare? Find out the surname, the name of the author of the book and a list of all author's works by series.

Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Stuxnet to Sunburst
Stuxnet to Sunburst
20 Years of Digital Exploitation and Cyber Warfare
Andrew Jenkinson
First edition published 2022 by CRC Press 6000 Broken Sound Parkway NW Suite - photo 1
First edition published 2022
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742
and by CRC Press
2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN
2022 Taylor & Francis Group, LLC
CRC Press is an imprint of Taylor & Francis Group, LLC
The right of Andrew Jenkinson to be identified as author of this work has been asserted by him in accordance with sections 77 and 78 of the Copyright, Designs and Patents Act 1988.
Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers.
For permission to photocopy or use material electronically from this work, access
Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for identification and explanation without intent to infringe.
ISBN: 978-1-032-06849-7 (hbk)
ISBN: 978-1-032-06850-3 (pbk)
ISBN: 978-1-003-20414-5 (ebk)
DOI: 10.1201/9781003204145
Typeset in Caslon
by SPi Technologies India Pvt Ltd (Straive)
The year 2021 the age of the interconnected, digital planet, in which for two decades has empowered commercial organisations, governments, institutions, and academia to leverage, what is almost unfettered interconnectivity to the benefit of transacting and delivering commodities and services over the always available World Wide Web (WWW). These embraced technologies have proven to be cost-effective and practical and have enabled both large and small companies alike to reach far and wide, crossing physical boarders by leveraging digital tentacles to reach afar into markets, which up to that juncture were out of reach. We may understand this digital evolution more by looking back to the path technologies have trodden with commercials and governments moving away from those cumbersome, expensive IBM, Tandem Mainframes, to mix in and exploit the advances of Commercial Off the Shelf (COTS) products, such as Windows NT 3.5 and 4.0, becoming coexistent with the new world of easily routed communications across the internet. In those formative years, the conclusion was, with such new, low-cost business and transactional opportunities what was not to like? However, what may now be considered as short-sighted in the clamber to evolve the opportunities presented by such infant systems, applications, and infrastructures of the digital revelation was, where there is good, lurking in the background, it was overlooked that there would be futuristic opportunities for criminals to exploit to their own financial end and government agencies to weaponise technology to their own end purpose!
Going back 20 years, can you imagine telling your grandparents that the TV in the corner of the room may be listening to their conversations, or to consider the kitchen appliances they purchased may have a Zero-Day exploit hidden within the on-board Chinese circuitry! Of course, at that time such an opinion would have been considered as a wild Orwellian thought of someone who didnt have a firm grip on reality yet in the year 2021, such a conversation would be accepted as the norm in an age suffering from a Cyber Threat Pandemic. To appreciate how we have arrived at such an insecure digital world, it is necessary to look back in techno time to understand the roots of digital adversity, and the formative days out of which logical current dangers were born. In January 1986, the world encountered the first computer virus attacking Windows-based PCs under the tag of Brain. Brain was a boot sector virus which had been developed by brothers, Basit and Amjad Farooq Alvi, aged 17 and 24 years, respectively, who lived in Chah Miran, near Lahore Railway Station, in Pakistan. At that time, the prevalence of, what we now refer to as malware became a popular pass-time for activists of all types, resulting in the world of computing seeing its first big security challenge. It is however interesting to acknowledge that in those early days of viruses being seen in the wild, it was CESGs (GCHQ) opinion that such technical dangers were just a passing nuisance. However, what was to follow would be, or should have been a wake up and smell the coffee call of the dangers posed by the new destructive computer virus. It was on 2 November 1988 when the world encountered the release and impact of the Morris Worm, the first computer virus (worm) to be distributed via the internet. The Morris Worm was also the worlds first intelligent piece of malware targeting vulnerabilities in Unix systems, such as a point of exploitation associated with sendmail, a system buffer overflow, and a remote execution taking advantage of a shell condition. Back in 1988 the damage caused by this code amounted to a staggering $100,000$10,000,000 financial impact. The Morris Worm was what would now be probably tagged as Zero-Day exploit, but Andrew will come back to Zero Days and cover them in depth later in Stuxnet to Sunburst.
As time progressed, unlike the forefathers of the early viral strains, those with darker intent saw the potential to leverage an adverse logical condition to their own financial gain, and so the criminal cultures of society started to invest their digital creativity developing code for criminal purpose. Such early days of dark coding included Trojan Horse and Spyware programs with the intent of scraping valuable data from the target victims computer, or by dropping a Distributed Denial of Service (DDoS) attack with a view to blackmailing the targeted client to pay up so that the attack would be ceased very much in the guise of DDoS attacks on the online gaming community, who were happy to pay up to get their operations back online. And of course, on the criminal front, not overlooking the multiples of successful Ransomware attacks in 2021 on organisations ranging from Serco through to the Colonial Pipeline compromise, which saw millions of US dollars handed over to the attackers what can be considered, funding the longer-term operational aspirations of criminal gangs (the attackers will be back).
When we arrive at the dangers posed by State-Sponsored Actors, it is not just the obvious culprits such as North Korea and China who have set their teams to work evolving the next Advanced Persistent Threat (APT). They are joined by the more developed intelligence players who are (or were) well ahead of the game to weaponise digital assets. Here I call out the USA with their developed CIA and NSA activities, the UK in the guise of GCHQ, and of course the everactive Russian contingent, under the banner of the GRU, and their little helpers such as Cozy Bear (APT29). In this space there is one very notable mission which was the code that really did set the digital wrecker ball in motion Stuxnet. As we are now aware, Stuxnet was weaponised by malicious code that had been signed off by the Obama Administration circa 2005 and was the key component of project Olympic Games. The objective of Stuxnet was to disrupt the mission of Iran in its nuclear aspirations, and to secretly attack their SCADA Industrial Control Systems with the intent of degrading and destroying their centrifuges. A digitally discreet mission which was so successful it corrupted more than 200,000 computers and damaged over 1,000 machines Stuxnet will be covered in more depth in later chapters. However, one fact can be taken as certain, this was the weaponised code that changed the shape of what is now the futuristic of a Digital Theatre of Conflict.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare»

Look at similar books to Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare»

Discussion, reviews of the book Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyber Warfare and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.