Bestseller Books Worm The First Digital World War published From the author of Black Hawk Down comes the story of the battle between those determined to exploit the internet and those committed to pr
Bestseller Books Worm: The First Digital World War published From the author of Black Hawk Down comes the story of the battle between those determined to exploit the internet and those committed to protect itthe ongoing war taking place literally beneath our fingertips The Conficker worm infected its first computer in November 2008 and within a month had infiltrated 1.5 million computers in 195 countries Banks, telecommunicationFrom the author of Black Hawk Down comes the story of the battle between those determined to exploit the internet and those committed to protect itthe ongoing war taking place literally beneath our fingertips The Conficker worm infected its first computer in November 2008 and within a month had infiltrated 1.5 million computers in 195 countries Banks, telecommunications companies, and critical government networks including the British Parliament and the French and German military were infected No one had ever seen anything like it By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm the story of the first digital world war.. A viral Kindle Worm: The First Digital World War There is a war being waged in the world today. Not one of the many you read about in newspapers (or newsfeeds) or the ones you see on your televisions and computer screens. This war is going on while we sleep, eat our breakfasts and go about our business, in our cities and suburbs, in the homes of our major industries, in our home computers. Forget the annoying daily viruses that attack, primarily, Windows systems, spewing unwanted spam; forget the unwanted pop-ups that emanate from the same source; forget the Blue Screen of Death and similar results from other fun system-stoppers that flood the lines connecting our machines to the world. This is an ongoing cyberwar, complete with black hats and white hats. There are folks out there who have devised a truly weaponized form of the evil sheiss we have to cope with every day. This new invader is capable of taking down the entire system. It is robust, almost impervious to correction even once detected, and it has spread itself, functioning like millions of sleeper cells throughout our electronic world, and it waits for instructions. It might be told to send out the usual sort of sexual spam we have all seen. No biggie. But then it might take down the entire internet by flooding certain sites with millions of hits. It might be instructed to disable the electrical grid, or occupy Wall Street’s computer systems. (Yes, I know some might cheer, but the damage would extend well beyond the street) And just because we do not yet have a body count that does not mean that this war does not have casualties. Businesses that have had to shut down because of such attacks, hundreds of millions of dollars, maybe billions, that might have been spent on more productive uses, but which have been allocated to cyber defense. Most recently, [when this was originally written] Sony has enjoyed the pleasure of high end digital trouble-making, thanks to our friendly neighbors in North Korea. Thank god there are some heroes out there who are making our lives a bit, a lot safer, by indulging their need to do the right thing.Each chapter is introduced by a quote from the X-Men comic book series. It is entirely appropriate, as Bowden sees his core characters as people with special powers. They are truly superheroes, operating on their own, outside government, for the most part, to fight off an invasion that most of us did not notice at all. The X-Men of Bowden’s tale are the ones who first caught on to this invasion, the ones with the technical savvy to actually appreciate how powerful, how dangerous, how sinister and how clever this invader is. It is thanks to them that our electronic world has not returned to pencil-and-paper accounting, and our trains have not been dashing into each other head on. I bet you will not recognize a single name among this group. No Steve Jobs or Bill Gates here, although many of the team members have done quite nicely for themselves. These Jean Grays, Logans, Kitty Prides and Professor Xaviers (although all male) combined their brainpower and did what needed to be done, even though it meant having to open their own checkbooks, and strain their home lives, to cover some of the considerable costs entailed. Ironically, they call themselves “The Cabal.” Bowden, author of Blackhawk Down and Killing Pablo knows adventure, and there is plenty to be had here. Not a car chase in sight, but if your heart does not race while reading this, you might want to get it checked.What is most amazing is how uninvolved our government has been in protecting the nation from assaults, real and potential, on our infrastructure, our financial system, and our defense systems, by not only bored, gifted teens, but by high level criminal enterprises and nation states. Actually not so surprising, given that the administration in question is the one that ignored repeated warnings of impending terrorist attacks in 2001. The current administration has taken the challenge more seriously, but I have not yet read any book-length materials that report on that.I have only one caveat for readers of this exciting book. Although it has clearly been written with a general audience in mind, there is enough geekish detail here to cause more than a bit of befuddlement. Bowden does a pretty good job of de-teching the material, and I scooted past it easily enough, but I am not a typical reader for this, having spent a few decades fiddling with bits and bytes. So take with a grain of salt my sense that the tech will not get in the way. For any who find that absolutely needing to grasp all the technical details impairs their reading experience, I suggest blowing past it. It is not critical for you to get the minutiae. The gist is plenty, and it is substantial. Worm is a page-turner. Be an early bird and catch it. There are more than a couple of books on the subject out there. I have read only a few. Neil Stephenson offers a fictionalized version of how clever techies might make mayhem in the world inReamde. Richard Clarke has real world expertise in this area. He has a clear notion of what is going on, what is possible and what we should be afraid of. He writes both non-fictionCyberwarand fiction,Breakpoint.Update December 23, 2016 - The book came out and I wrote the above review in 2011. It has only gotten worse since then. Hackery of different sorts has resulted in the USA facing the prospect of actual fascism taking over our government institutions. This includes both the Russians hacking our government departments and political parties, then using their crimes to tilt the USA election to favor their patsy, and the political hackery of traitors to the republic like FBI director Comey, who blatantly misused his office for political reasons, have caused us all immeasurable harm. Evil assholes we will always have with us, whether Putin, Trump, or their many ethics-free, power-hungry, money grubbing minions. But we as a nation should have the technical capability to keep one step ahead, at least on the technical side of things. Bowden points to some good actors here. given that the instruments of government will be in small, hostile hands, they, and their like, should be recruited by those who care about our country and who have the means to finance their activities to plug up as many holes in the dike as can be identified, and to try to keep ahead of the emerging threats. QUOTES - I read this on a Nook, so the page numbers might not track with the hardcoverP84 – Networks connected to the internet are vulnerable even if protected with hardware and software firewalls and other security mechanisms. The government, military, business and economic institutions, key infrastructure elements, and the population at large of the United States are completely dependent on the Internet. Internet-connected networks operate the national electric grid and distribution systems for fuel. Municipal water treatment and waste treatment are controlled through such systems. Other critical networks include the air traffic control system, the system linking the nation’s financial institutions, and the payment systems for Social Security and other government assistance on which many individuals and the overall economy depend. A successful attack on these internet-connected networks could paralyze the united States.” – [This is from a U.S. China Economic and Security Review Commission report to Congress.]P 170 – in Modern warfare there is no such thing as unqualified victory, or unconditional defeat…Casualties mount. The public gets surly. The treasury coffers bottom out. The ruling party gets dumped. One no longer wins; one claims victory. Often both sides do. And sometimes both are right…in their own way.
Worm The First Digital World War Bowden, Mark It is the Conficker Worm, an arcane name an insider s joke for the most powerful malware malicious software yet encountered on the Internet First detected in November , Conficker is a devilishly clever bit of programming that took advantage of a Worm The First Digital World War Bowden, Mark The Conficker worm infected its first computer in November and within a month had infiltrated . million computers in countries Banks, telecommunications companies, and critical government networks including the British Parliament and the French and German military were infected. Morris worm Mark Bowden s Worm The First Digital World War The Oct , Worm tells this story by following the work of The Cabal, an ad hoc group of cybersecurity experts who assembled online first to figure out, Worm The First Digital World War by Mark Bowden Jan , The subtitle for this book is The First Digital World War That s overstating it, to be honest The book focuses on the creation of the world s largest botnet by a worm called Conficker back in At its peak, it was estimated to have infected between and million machines, and even as late as was still on roughly . million. Worm The First Digital World War C SPAN Oct , Mark Bowden, author of Worm The First Digital World War and T.J Campana, senior program manager for the Digital Crimes Unit at Microsoft, talked about the Conficker This computer worm This worm like creature is the first ancestor on the human Mar , Evidence of a worm like creature about the size of a grain of rice has been uncovered in South Australia, and researchers believe it is the oldest ancestor on First Woolly Worm of the Year Woolly Bear Jul , First Woolly Worm of the Year Folklore says that if the rusty brown band is wide segments , then it will be a mild winter The black there is, the severe the winter. The First Endbringer Worm CYOA SI, Endbringer SI Jun , The first was the useful Pocket Space, which allowed me to steal food and money to survive The second was the lethal power Remote Transfer It allowed me to teleport objects in my hand to somewhere in my sight initially, but as I used it , I could teleport objects to places I was extremely familiar with. Computer worm A helpful worm or anti worm is a worm designed to do something that its author feels is helpful, though not necessarily with the permission of the executing computer s owner Beginning with the very first research into worms at Xerox PARC, there have been attempts to create useful worms.