'Zero Days' - Hidden World of Cyber Warfare

Oscar-winner Alex Gibney flawlessly spins what could have been a tech-talk heavy bore into an enthralling espionage thriller complete with the assassinations of Iranian nuclear scientists and an arsenal of bits and bytes every bit as lethal as terrorists packing bombs and AR-15s.

New from the crazy uncle who unwittingly armed his enemies in Iran, Iraq and Afghanistan comes Stuxnet, the computer worm that just might replace the H-bomb as the thing we fear more than fear itself. 

Oscar-winner Alex Gibney, whose chilling documentary, “Zero Days,” rivetingly chronicles how Uncle Sam outsmarted himself by inadvertently providing our enemies a new weapon to turn against us. Who knew binary code could be so deadly?

Certainly not the folk at NSA, CIA and the various US alphabet agencies who conspired with Israeli “intelligence” to design, code and unleash the self-replicating Stuxnet malware on enough computers for it to eventually be intercepted and turned right back on our nation’s fragile cyber infrastructures. In other words, giving our not-so-good friends in Russia, Iran, China and North Korea the power to wipe out our power grids, financial systems and air-traffic controls with a few dozen strategic keystrokes.

Panic might be a little premature, but it won’t be if we don’t start treating cyberwarfare the same way we do nukes by forging treaties and setting rules of engagement. That’s the hope of prominent U.S. spymasters like Richard Clarke and Gen. Michael Hayden, the former chief of both the CIA and NSA. They are among the dozen or so experts Gibney interviews in his quest to root out the origins of Stuxnet, its untimely unfurling and its long-term effects on how we might wage war in the 21st century.

Their observations, and those of a spooky Max Headroom-type hologram collectively dishing out top-secret info leaked by a smattering of unnamed whistle-blowers inside the NSA, will scare the bejesus out of you. But the beauty of Gibney, the genius behind classic docs like “Taxi to the Dark Side,” “Going Clear,” “Steve Jobs,” “Enron: The Smartest Guys in the Room” and “Client 9,” is his ability to make his relentless muckraking shamefully entertaining, even generating laughs among the doomsday predictions. Even better is his brilliant use of pictures and graphics to make an incredibly complex subject almost easy to understand, particularly in how Stuxnet was devised to anonymously attack the rapidly spinning centrifuges in Iran’s heavily fortified fuel-enrichment plant in Natanz.

No digital clock counting down? Not with Stuxnet and its even more powerful successor, Nitro Zeus. They are malware that frighteningly strike silently and without warning.

The first thing Gibney’s array of experts stress is moving cyber-warfare out of the shadows and into the light, by having Western intelligence organizations admit that such programs exist and then open a worldwide dialogue on controlling it so – like nukes – we don’t end up on the verge of destroying Earth.

As General Hayden says, like 1945, we’ve opened a Pandora’s Box, and there’s no chance of ever putting the lid back. No thanks to the Stuxnet inventors, we must learn to live with it. And how we choose to do that will greatly determine if we live free, or at the mercy of these “cyber armies” who could well be the deaths of us all.

Ein News

« Ransomware Victims Run Into Millions
Improved Security For The Internet-of-Things »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Deep Identity

Deep Identity

Deep Identity is a boutique system integrator, with expertise in tailored identity governance & administration (IGA) and identity access management (IAM) solutions.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Materna Virtual Solution

Materna Virtual Solution

Materna Virtual Solution security solutions enable user-friendly, secure mobile working environments.

Syhunt Security

Syhunt Security

Syhunt is a leading player in the web application security field, delivering its assessment tools to a range of organizations across the globe.

Real Random

Real Random

Real Random is on a mission to enhance existing and new crypto-systems with its revolutionary solution to generating numbers that are Truly Random.

Billington CyberSecurity

Billington CyberSecurity

Billington CyberSecurity is a leading, independent education company with an exclusive focus on cybersecurity.

NJVC

NJVC

NJVC delivers IT automation, optimization and security to empower mission-enabling IT for customers with secure requirements.

M2MD Technologies

M2MD Technologies

M2MD Technologies offers solutions optimized for cellular IoT that provide stronger security, reduced costs, enhanced user experience, and ultimately generates higher returns for stakeholders.

Hex-Rays

Hex-Rays

Founded in 2005, privately held, Belgium based, Hex-Rays SA focuses on the development of fast, stable, and robust binary analysis tools for the IT security market.

watchTowr

watchTowr

Continuous Attack Surface Testing, with the watchTowr Platform. The future of Attack Surface Management.

HEROIC Cybersecurity

HEROIC Cybersecurity

HEROIC’s enterprise cybersecurity services help improve overall organizational security with industry best practices and advanced technology solutions.

Mobilicom

Mobilicom

Mobilicom is an end-to-end provider of cybersecurity and smart solutions for drones, robotics & autonomous platforms.

US Department of State - Bureau of Cyberspace & Digital Policy

US Department of State - Bureau of Cyberspace & Digital Policy

The Bureau of Cyberspace and Digital Policy leads and coordinates the Department’s work on cyberspace and digital diplomacy to encourage responsible state behavior in cyberspace.

BeamSec

BeamSec

BeamSec is a cybersecurity solutions provider committed to addressing the human element of risk against the evolving landscape of email-based cyber threats.

Novera

Novera

Novera offer security assessment and advisory services to help businesses manage risks from AI, cyber and privacy.

SafeShark

SafeShark

SafeShark are Product Security and Telecommunications Infrastructure (PTSI) Act and Radio Equipment Directive (RED) compliance specialists.