Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon


Kim Zetter - 2014
    The cause of their failure was a complete mystery.Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away. And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.

The Perfect Weapon: How the Cyber Arms Race Set the World Afire


David E. Sanger - 2018
    The Perfect Weapon is the riveting story of how, in less than a decade, cyberwarfare displaced terrorism and nuclear attacks as the greatest threat to American national security. Cheap to acquire, difficult to defend against, and designed to shield their user's identities so as to complicate retaliation, these weapons are capable of an unprecedented range of offensive tactics; they can take us just short of war, allowing for everything from disruption to theft to the cause of widespread damage of essential infrastructure systems. And the vulnerability of those systems has created a related but equally urgent conflict: American companies like Apple and Cisco must claim allegiance to no government in the name of selling secure products around the globe yet the US intelligence agencies want the help of such companies in defending against future cyberattacks. Reported and written with unprecedented access by New York Times chief Washington correspondent and bestselling author David Sanger, The Perfect Weapon takes readers inside war rooms and boardrooms, into the secret cyberdens of American and Chinese military, to give the deep-background story of the increasingly pitched battle between nations, their governments, their cyberwarriors, and their corporations.

Wired for War: The Robotics Revolution and Conflict in the Twenty-First Century


P.W. Singer - 2009
    More then seven thousand robotic systems are now in Iraq. Pilots in Nevada are remotely killing terrorists in Afghanistan. Scientists are debating just how smart - and how lethal - to make their current robotic prototypes. And many of the most renowned science fiction authors are secretly consulting for the Pentagon on the next generation.Blending historic evidence with interviews from the field, Singer vividly shows that as these technologies multiply, they will have profound effects on the front lines as well as on the politics back home. Moving humans off the battlefield makes wars easier to start, but more complex to fight. Replacing men with machines may save some lives, but will lower the morale and psychological barriers to killing. The "warrior ethos", which has long defined soldiers' identity, will erode, as will the laws of war that have governed military conflict for generations.While his analysis is unnerving, there's an irresistible gee-whiz quality to the innovations Singer uncovers. Wired for War travels from Iraq to see these robots in combat to the latter-day "skunk works" in America's suburbia, where tomorrow's technologies of war are quietly being designed. In Singer's hands, the future of war is as fascinating as it is frightening.

This Is How They Tell Me the World Ends: The Cyberweapons Arms Race


Nicole Perlroth - 2021
    One of the most coveted tools in a spy's arsenal, a zero day has the power to silently spy on your iPhone, dismantle the safety controls at a chemical plant, alter an election, and shut down the electric grid (just ask Ukraine).For decades, under cover of classification levels and non-disclosure agreements, the United States government became the world's dominant hoarder of zero days. U.S. government agents paid top dollar-first thousands, and later millions of dollars- to hackers willing to sell their lock-picking code and their silence. Then the United States lost control of its hoard and the market. Now those zero days are in the hands of hostile nations and mercenaries who do not care if your vote goes missing, your clean water is contaminated, or our nuclear plants melt down.Filled with spies, hackers, arms dealers, and a few unsung heroes, written like a thriller and a reference, This Is How They Tell Me the World Ends is an astonishing feat of journalism. Based on years of reporting and hundreds of interviews, The New York Times reporter Nicole Perlroth lifts the curtain on a market in shadow, revealing the urgent threat faced by us all if we cannot bring the global cyber arms race to heel.

@War: The Rise of the Military-Internet Complex


Shane Harris - 2014
    In fact, as @WAR shows, U.S. hackers were crucial to our victory in Iraq. Shane Harris delves into the frontlines of America’s new cyber war. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information. The military has also formed a new alliance with tech and finance companies to patrol cyberspace, and Harris offers a deeper glimpse into this partnership than we have ever seen before. Finally, Harris explains what the new cybersecurity regime means for all of us, who spend our daily lives bound to the Internet — and are vulnerable to its dangers.

The Hundred-Year Marathon: China's Secret Strategy to Replace America as the Global Superpower


Michael Pillsbury - 2014
    government's leading China experts reveals the hidden strategy fueling that country's rise – and how Americans have been seduced into helping China overtake us as the world's leading superpower.For more than forty years, the United States has played an indispensable role helping the Chinese government build a booming economy, develop its scientific and military capabilities, and take its place on the world stage, in the belief that China's rise will bring us cooperation, diplomacy, and free trade. But what if the "China Dream" is to replace us, just as America replaced the British Empire, without firing a shot?Based on interviews with Chinese defectors and newly declassified, previously undisclosed national security documents, The Hundred-Year Marathon reveals China's secret strategy to supplant the United States as the world's dominant power, and to do so by 2049, the one-hundredth anniversary of the founding of the People's Republic. Michael Pillsbury, a fluent Mandarin speaker who has served in senior national security positions in the U.S. government since the days of Richard Nixon and Henry Kissinger, draws on his decades of contact with the "hawks" in China's military and intelligence agencies and translates their documents, speeches, and books to show how the teachings of traditional Chinese statecraft underpin their actions. He offers an inside look at how the Chinese really view America and its leaders – as barbarians who will be the architects of their own demise.Pillsbury also explains how the U.S. government has helped – sometimes unwittingly and sometimes deliberately – to make this "China Dream" come true, and he calls for the United States to implement a new, more competitive strategy toward China as it really is, and not as we might wish it to be. The Hundred-Year Marathon is a wake-up call as we face the greatest national security challenge of the twenty-first century.

Dark Territory: The Secret History of Cyber War


Fred Kaplan - 2016
    The general said it was. This set in motion the first presidential directive on computer security.The first use of cyber techniques in battle occurred in George H.W. Bush's Kuwait invasion in 1991 to disable Saddam's military communications. One year later, the NSA Director watched Sneakers, in which one of the characters says wars will soon be decided not by bullets or bombs but by information. The NSA and the Pentagon have been rowing over control of cyber weapons ever since.From the 1994 (aborted) US invasion of Haiti, when the plan was to neutralize Haitian air-defenses by making all the telephones in Haiti busy at the same time, to Obama's Defense Department 2015 report on cyber policy that spells out the lead role played by our offensive operation, Fred Kaplan tells the story of the NSA and the Pentagon as they explore, exploit, fight, and defend the US. Dark Territory reveals all the details, including the 1998 incident when someone hacked into major US military commands and it wasn't Iraq, but two teenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air-defense radar system; the time in 2014 when North Korea hacks Sony's networks to pressure the studio to cancel a major Hollywood blockbuster; and many more. Dark Territory is the most urgent and controversial topic in national defense policy.

Stealth War: How China Took Over While America's Elite Slept


Robert Spalding - 2019
    While those in power have been distracted and disorderly, China has waged a six-front war on America's economy, military, diplomacy, technology, education, and infrastructure--and they're winning. It's almost too late to undo the shocking, though nearly invisible, victories of the Chinese.In Stealth War, retired Air Force Brigadier General Robert Spalding reveals China's motives and secret attacks on the West. Chronicling how our leaders have failed to protect us over recent decades, he provides shocking evidence of some of China's most brilliant ploys, including:- Placing Confucius Institutes in universities across the United States that serve to monitor and control Chinese students on campus and spread communist narratives to unsuspecting American students.- Offering enormous sums to American experts who create investment funds that funnel technology to China.- Signing a thirty-year agreement with the US that allows China to share peaceful nuclear technology, ensuring that they have access to American nuclear know-how.Spalding's concern isn't merely that America could lose its position on the world stage. More urgently, the Chinese Communist Party has a fundamental loathing of the legal protections America grants its people and seeks to create a world without those rights.Despite all the damage done so far, Spalding shows how it's still possible for the U.S. and the rest of the free world to combat--and win--China's stealth war.

Worm: The First Digital World War


Mark Bowden - 2011
    Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.

Active Measures: The Secret History of Disinformation and Political Warfare


Thomas Rid - 2020
    Spy agencies pour vast resources into hacking, leaking, and forging data, often with the goal of weakening the very foundation of liberal democracy: trust in facts. Thomas Rid, a renowned expert on technology and national security, was one of the first to sound the alarm. More than four months before the 2016 election, he warned that Russian military intelligence was "carefully planning and timing a high-stakes political campaign to disrupt the democratic process. But as crafty as such so-called active measures have become, they are not new.The story of modern disinformation begins with the post-Russian Revolution clash between communism and capitalism, which would come to define the Cold War. In Active Measures, Rid reveals startling intelligence and security secrets from materials written in more than ten languages across several nations, and from interviews with current and former operatives. He exposes the disturbing yet colorful history of professional, organized lying, revealing for the first time some of the century's most significant operations--many of them nearly beyond belief. A White Russian ploy backfires and brings down a New York police commissioner; a KGB-engineered, anti-Semitic hate campaign creeps back across the Iron Curtain; the CIA backs a fake publishing empire, run by a former Wehrmacht U-boat commander, that produces Germany's best jazz magazine. Rid tracks the rise of leaking, and shows how spies began to exploit emerging internet culture many years before WikiLeaks. Finally, he sheds new light on the 2016 election, especially the role of the infamous "troll farm" in St. Petersburg as well as a much more harmful attack that unfolded in the shadows.Active Measures takes the reader on a guided tour deep into a vast hall of mirrors old and new, pointing to a future of engineered polarization, more active and less measured--but also offering the tools to cut through the deception.

Cyberwar: The Next Threat to National Security & What to Do About It


Richard A. Clarke - 2010
    Clarke sounds a timely and chilling warning about America’s vulnerability in a terrifying new international conflict—Cyber War! Every concerned American should read this startling and explosive book that offers an insider’s view of White House ‘Situation Room’ operations and carries the reader to the frontlines of our cyber defense. Cyber War exposes a virulent threat to our nation’s security. This is no X-Files fantasy or conspiracy theory madness—this is real.

Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers


Andy Greenberg - 2019
    Targeting American utility companies, NATO, and electric grids in Eastern Europe, the strikes became ever more brazen, eventually leading to the first-ever blackouts triggered by hackers. They culminated in the summer of 2017 when malware known as NotPetya was unleashed, compromising, disrupting, and paralyzing some of the world's largest companies. At the attack's epicenter in Ukraine, ATMs froze. The railway and postal systems shut down. NotPetya spread around the world, inflicting an unprecedented ten billions of dollars in damage--the largest, most penetrating cyberattack the world had ever seen.The hackers behind these attacks are quickly gaining a reputation as the most dangerous team of cyberwarriors in the internet's history: Sandworm. Believed to be working in the service of Russia's military intelligence agency, they represent a persistent, highly skilled, state-sponsored hacking force, one whose talents are matched by their willingness to launch broad, unrestrained attacks on the most critical infrastructure of their adversaries. They target government and private sector, military and civilians alike.From WIRED senior writer Andy Greenberg comes Sandworm, the true story of the desperate hunt to identify and track those attackers. It considers the danger this force poses to our national stability and security. And as the Kremlin's role in manipulating foreign governments and sparking chaos globally comes into greater focus, Sandworm reveals the realities not just of Russia's global digital offensive, but of an era where warfare ceases to be waged on the battlefield--where the line between digital and physical conflict begins to blur, with world-shaking implications.

The Accidental Superpower: The Next Generation of American Preeminence and the Coming Global Disorder


Peter Zeihan - 2014
    Empires were abolished and replaced by a global arrangement enforced by the U.S. Navy. With all the world's oceans safe for the first time in history, markets and resources were made available for everyone. Enemies became partners.We think of this system as normal - it is not. We live in an artificial world on borrowed time.In The Accidental Superpower, international strategist Peter Zeihan examines how the hard rules of geography are eroding the American commitment to free trade; how much of the planet is aging into a mass retirement that will enervate markets and capital supplies; and how, against all odds, it is the ever-ravenous American economy that - alone among the developed nations - is rapidly approaching energy independence. Combined, these factors are doing nothing less than overturning the global system and ushering in a new (dis)order. For most, that is a disaster-in-waiting, but not for the Americans. The shale revolution allows Americans to sidestep an increasingly dangerous energy market. Only the United States boasts a youth population large enough to escape the sucking maw of global aging. Most important, geography will matter more than ever in a de-globalizing world, and America's geography is simply sublime.

Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath


Ted Koppel - 2015
    Tens of millions of people over several states are affected. For those without access to a generator, there is no running water, no sewage, no refrigeration or light. Food and medical supplies are dwindling. Devices we rely on have gone dark. Banks no longer function, looting is widespread, and law and order are being tested as never before.  It isn’t just a scenario. A well-designed attack on just one of the nation’s three electric power grids could cripple much of our infrastructure—and in the age of cyberwarfare, a laptop has become the only necessary weapon. Several nations hostile to the United States could launch such an assault at any time. In fact, as a former chief scientist of the NSA reveals, China and Russia have already penetrated the grid. And a cybersecurity advisor to President Obama believes that independent actors—from “hacktivists” to terrorists—have the capability as well. “It’s not a question of if,” says Centcom Commander General Lloyd Austin, “it’s a question of when.”  And yet, as Koppel makes clear, the federal government, while well prepared for natural disasters, has no plan for the aftermath of an attack on the power grid.  The current Secretary of Homeland Security suggests keeping a battery-powered radio.In the absence of a government plan, some individuals and communities have taken matters into their own hands. Among the nation’s estimated three million “preppers,” we meet one whose doomsday retreat includes a newly excavated three-acre lake, stocked with fish, and a Wyoming homesteader so self-sufficient that he crafted the thousands of adobe bricks in his house by hand. We also see the unrivaled disaster preparedness of the Mormon church, with its enormous storehouses, high-tech dairies, orchards, and proprietary trucking company – the fruits of a long tradition of anticipating the worst. But how, Koppel asks, will ordinary civilians survive?With urgency and authority, one of our most renowned journalists examines a threat unique to our time and evaluates potential ways to prepare for a catastrophe that is all but inevitable.

Battlegrounds: The Fight to Defend the Free World


H.R. McMaster - 2020
    General H.R. McMaster, U.S. Army, ret., the former National Security Advisor and author of the bestselling classic Dereliction of Duty, comes a bold and provocative re-examination of the most critical foreign policy and national security challenges that face the United States, and an urgent call to compete to preserve America’s standing and security.Across multiple administrations since the end of the Cold War, American foreign policy has been misconceived, inconsistent, and poorly implemented. As a result, America and the free world have fallen behind rivals in power and influence. Meanwhile threats to security, freedom, and prosperity, such as nuclear proliferation and jihadist terrorism have grown. In BATTLEGROUNDS, H.R. McMaster describes efforts to reassess and fundamentally shift policies while he was National Security Advisor. And he provides a clear pathway forward to improve strategic competence and prevail in complex competitions against our adversaries.BATTLEGROUNDS is a groundbreaking reassessment of America’s place in the world, drawing from McMaster’s long engagement with these issues, including 34 years of service in the U.S. Army with multiple tours of duty in battlegrounds overseas and his 13 months as National Security Advisor in the Trump White House. It is also a powerful call for Americans and citizens of the free world to transcend the vitriol of partisan political discourse, better educate themselves about the most significant challenges to national and international security and work together to secure peace and prosperity for future generations.