• Complain

Kim Zetter - Countdown to Zero Day: Stuxnet and the Launch of the Worlds First Digital Weapon

Here you can read online Kim Zetter - Countdown to Zero Day: Stuxnet and the Launch of the Worlds First Digital Weapon full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2014, publisher: Crown, genre: Detective and thriller. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Countdown to Zero Day: Stuxnet and the Launch of the Worlds First Digital Weapon
  • Author:
  • Publisher:
    Crown
  • Genre:
  • Year:
    2014
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Countdown to Zero Day: Stuxnet and the Launch of the Worlds First Digital Weapon: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Countdown to Zero Day: Stuxnet and the Launch of the Worlds First Digital Weapon" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Irans nuclear efforts and shows how its existence has ushered in a new age of warfareone in which a digital attack can have the same destructive capability as a megaton bomb.
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at an Iranian uranium enrichment plant were failing at an unprecedented rate. The cause was a complete mysteryapparently as much to the technicians replacing the centrifuges as to the inspectors observing them.
Then, five months later, a seemingly unrelated event occurred: A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were crashing and rebooting repeatedly.
At first, the firms programmers believed the malicious code on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a mysterious virus of unparalleled complexity.
They had, they soon learned, stumbled upon the worlds first digital weapon. For Stuxnet, as it came to be known, was unlike any other virus or worm built before: Rather than simply hijacking targeted computers or stealing information from them, it escaped the digital realm to wreak actual, physical destruction on a nuclear facility.
In these pages, Wired journalist Kim Zetter draws on her extensive sources and expertise to tell the story behind Stuxnets planning, execution, and discovery, covering its genesis in the corridors of Bushs White House and its unleashing on systems in Iranand telling the spectacular, unlikely tale of the security geeks who managed to unravel a sabotage campaign years in the making.
But Countdown to Zero Day ranges far beyond Stuxnet itself. Here, Zetter shows us how digital warfare developed in the US. She takes us inside todays flourishing zero-day grey markets, in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks. She reveals just how vulnerable many of our own critical systems are to Stuxnet-like strikes, from nation-state adversaries and anonymous hackers alikeand shows us just what might happen should our infrastructure be targeted by such an attack.
Propelled by Zetters unique knowledge and access, and filled with eye-opening explanations of the technologies involved, Countdown to Zero Day is a comprehensive and prescient portrait of a world at the edge of a new kind of war.

Kim Zetter: author's other books


Who wrote Countdown to Zero Day: Stuxnet and the Launch of the Worlds First Digital Weapon? Find out the surname, the name of the author of the book and a list of all author's works by series.

Countdown to Zero Day: Stuxnet and the Launch of the Worlds First Digital Weapon — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Countdown to Zero Day: Stuxnet and the Launch of the Worlds First Digital Weapon" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Copyright 2014 by Kim Zetter All rights reserved Published in the United - photo 1
Copyright 2014 by Kim Zetter All rights reserved Published in the United - photo 2

Copyright 2014 by Kim Zetter

All rights reserved.

Published in the United States by Crown Publishers, an imprint of the Crown Publishing Group, a division of Random House LLC, a Penguin Random House Company, New York.

www.crownpublishing.com

CROWN and the Crown colophon are registered trademarks of Random House LLC.

Portions of this work were originally published in different form in How Digital Detectives Deciphered Stuxnet, the Most Menacing Malware in History copyright Wired.com. Used with permission. First published July 2011.

Cataloging-in-Publication data is on file with the Library of Congress.

ISBN 978-0-7704-3617-9

eBook ISBN 978-0-7704-3618-6

P RINTED IN THE U NITED S TATES OF A MERICA

Jacket design by Oliver Munday

Jacket photograph: DigitalGlobe/Getty Images

v3.1

For SC and for my parentswith love and great gratitude, though gratitude is insufficient for all that youve done.

CONTENTS
PROLOGUE
THE CASE OF THE CENTRIFUGES

It was January 2010 when officials with the International Atomic Energy Agency (IAEA), the United Nations body charged with monitoring Irans nuclear program, first began to notice something unusual happening at the uranium enrichment plant outside Natanz in central Iran.

Inside the facilitys large centrifuge hall, buried like a bunker more than fifty feet beneath the desert surface, thousands of gleaming aluminum centrifuges were spinning at supersonic speed, enriching uranium hexafluoride gas as they had been for nearly two years. But over the last weeks, workers at the plant had been removing batches of centrifuges and replacing them with new ones. And they were doing so at a startling rate.

At Natanz each centrifuge, known as an IR-1, has a life expectancy of about ten years. But the devices are fragile and prone to break easily. Even under normal conditions, Iran has to replace up to 10 percent of the centrifuges each year due to material defects, maintenance issues, and worker accidents.

In November 2009, Iran had about 8,700 centrifuges installed at Natanz, so it would have been perfectly normal to see technicians decommission about 800 of them over the course of the year as the devices failed for one reason or another. But as IAEA officials added up the centrifuges removed over several weeks in December 2009 and early January, they realized that Iran was plowing through them at an unusual rate.

Inspectors with the IAEAs Department of Safeguards visited Natanz an average of twice a monthsometimes by appointment, sometimes unannouncedto track Irans enrichment activity and progress. Anytime workers at the plant decommissioned damaged or otherwise unusable centrifuges, they were required to line them up in a control area just inside the door of the centrifuge rooms until IAEA inspectors arrived at their next visit to examine them. The inspectors would run a handheld gamma spectrometer around each centrifuge to ensure that no nuclear material was being smuggled out in them, then approve the centrifuges for removal, making note in reports sent back to IAEA headquarters in Vienna of the number that were decommissioned each time.

IAEA digital surveillance cameras, installed outside the door of each centrifuge room to monitor Irans enrichment activity, captured the technicians scurrying about in their white lab coats, blue plastic booties on their feet, as they trotted out the shiny cylinders one by one, each about six feet long and about half a foot in diameter. The workers, by agreement with the IAEA, had to cradle the delicate devices in their arms, wrapped in plastic sleeves or in open boxes, so the cameras could register each item as it was removed from the room.

The surveillance cameras, which werent allowed inside the centrifuge rooms, stored the images for later perusal. Each time inspectors visited Natanz, they examined the recorded images to ensure that Iran hadnt removed additional centrifuges or done anything else prohibited during their absence.

Officially, the IAEA wont say how many centrifuges Iran replaced during this period. But news reports quoting European diplomats put the number at 900 to 1,000. A former top IAEA official, however, thinks the actual number was much higher. My educated guess is that 2,000 were damaged, says Olli Heinonen, who was deputy director of the Safeguards Division until he resigned in October 2010.

Whatever the number, it was clear that something was wrong with the devices. Unfortunately, Iran wasnt required to tell inspectors why they had replaced them, and, officially, the IAEA inspectors had no right to ask. The agencys mandate was to monitor what happened to uranium at the enrichment plant, not keep track of failed equipment.

What the inspectors didnt know was that the answer to their question was right beneath their noses, buried in the bits and memory of the computers in Natanzs industrial control room. Months earlier, in June 2009, someone had quietly unleashed a destructive digital warhead on computers in Iran, where it had silently slithered its way into critical systems at Natanz, all with a single goal in mindto sabotage Irans uranium enrichment program and prevent President Mahmoud Ahmadinejad from building a nuclear bomb.

The answer was there at Natanz, but it would be nearly a year before the inspectors would obtain it, and even then it would come only after more than a dozen computer security experts around the world spent months deconstructing what would ultimately become known as one of the most sophisticated viruses ever discovereda piece of software so unique it would make history as the worlds first digital weapon and the first shot across the bow announcing the age of digital warfare.


The number of inspection visits to Natanz has increased since this period. Beginning in 2010, inspections increased to once a week, and after a new agreement with Iran in late 2013, inspectors are now on-site at Natanz every day.

IAEA inspectors are not allowed to remove the recorded images from Natanz and can only view them on-site, where they are stored.

Inspectors visiting Natanz and other nuclear facilities around the world rotate on a regular basis, so the same IAEA inspectors dont visit every time. This is why the large number of decommissioned centrifuges didnt get noticed until after several reports of changing numbers arrived in Vienna and got viewed in the aggregate by analysts and officials there.

CHAPTER 1
EARLY WARNING

Sergey Ulasen is not the sort of person youd expect to find at the center of an international incident. The thirty-one-year-old Belarusian has close-cropped blond hair, a lean boyish frame, and the open face and affable demeanor of someone who goes through life attracting few enemies and even fewer controversies. One of his favorite pastimes is spending the weekend at his grandmothers country house outside Minsk, where he decompresses from weekday stresses, far from the reach of cell phones and the internet. But in June 2010, Ulasen encountered something unusual that soon propelled him into the international spotlight and into a world of new stress.

It was a warm Thursday afternoon, and Ulasen, who headed the antivirus division of a small computer security firm in Belarus called Virus-BlokAda, was seated with his colleague Oleg Kupreev in their lab in downtown Minsk inside a drab, Soviet-era building about a block from the Svisloch River. They were sifting methodically through suspicious computer files they had recently found on a machine in Iran when something striking leapt out at Kupreev. He sat back in his chair and called Ulasen over to take a look. Ulasen scrolled through the code once, then again, to make sure he was seeing what he thought he saw. A tiny gasp escaped his throat. The code they had been inspecting the past few days, something they had until now considered a mildly interesting but nonetheless run-of-the-mill virus, had just revealed itself to be a work of quiet and diabolical genius.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Countdown to Zero Day: Stuxnet and the Launch of the Worlds First Digital Weapon»

Look at similar books to Countdown to Zero Day: Stuxnet and the Launch of the Worlds First Digital Weapon. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Countdown to Zero Day: Stuxnet and the Launch of the Worlds First Digital Weapon»

Discussion, reviews of the book Countdown to Zero Day: Stuxnet and the Launch of the Worlds First Digital Weapon and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.