The Industries of the Future
Rate it:
Open Preview
Started reading November 4, 2019
31%
Flag icon
Whether motivated by politics or profits or mayhem, the cost of cyberattacks has now eclipsed $400 billion a year,
31%
Flag icon
There are three main types of cyberattacks today: attacks on a network’s confidentiality, availability, and integrity.
32%
Flag icon
names, phone numbers, email addresses, and physical addresses—from about 70 million customers.
32%
Flag icon
The second type of cyberattack hits a network’s availability—attacks typically known as denial-of-service (DoS) or distributed denial-of-service (DDoS) attacks.
32%
Flag icon
How did the Syrian Electronic Army do it? They used a simple computer technique called phishing. To phish, a hacker typically sends an email that comes from what looks like a legitimate source.
33%
Flag icon
North Korea is a hellhole of a country, with a per capita GDP of less than $2,000—lower than Yemen, Tajikistan, and Chad and about one-sixteenth the size of South Korea’s GDP.
33%
Flag icon
Notably, all of North Korea’s Internet connectivity is supplied by a single Chinese company, China Unicom.
33%
Flag icon
As the Internet grows, it is expanding not simply to new users but to entirely new devices, well beyond standard computers, tablets, and smartphones.
33%
Flag icon
The digitization of nearly everything is poised to be one of the most consequential economic developments of the next ten years.
33%
Flag icon
Chambers predicts that the Internet of Things will grow to be a $19 trillion global market. For context, the GDP of the entire world is currently just a little more than $100 trillion.
33%
Flag icon
The growth of the Internet of Things is motivated by four main drivers. The first is the number of Internet-connected cars on the road, expected to grow from 23 million in 2015 to 152 million in 2020.
33%
Flag icon
The second driver is the advent of wearable technology, which doubled in use between 2013 and 2014. The third driver is the addition of smart controls in our homes, from thermostats ...
This highlight has been truncated due to consecutive passage length restrictions.
33%
Flag icon
revenues generated from smart home services are expected to reach a global market val...
This highlight has been truncated due to consecutive passage length restrictions.
34%
Flag icon
“Security has often been an afterthought in the design of those systems,” says Chris Bronk, a computer and information systems professor at the University of Houston. The
34%
Flag icon
In the Target hack, the tens of millions of credit card records were accessed because of a hack on Fazio Mechanical, a small company in Sharpsburg, Pennsylvania, that does heating, air-conditioning, and refrigeration jobs.
34%
Flag icon
Because all of these were connected, the hackers were able to install card-logging malware en masse on the point-of-sale consoles. Target is a company with a market capitalization of more than $50 billion and 347,000 employees,
34%
Flag icon
As he was explaining this to me, I was imagining what could happen if a system controlling home care robots were hacked. Could it be a way to hurt people? In July 2015, hackers managed to remotely infiltrate and shut down a Jeep Cherokee while it was speeding along the highway. What if, 20 years from now when some variant of the Google car has taken over the highways,
34%
Flag icon
It’s hard to imagine your refrigerator being hacked, but the reality is that it has already happened.
34%
Flag icon
Proofpoint’s findings reveal that cyber criminals have begun to commandeer home routers, smart appliances and other components of the Internet of Things and transform them into ‘thingbots’ to carry out the same type of malicious activity.”
34%
Flag icon
another use for these kinds of “thingbots” could be to mine cryptocurrencies.
34%
Flag icon
a fridge doesn’t have a traditional user from which you could steal anything at all, but they do have computing power, and they are online,” says Hypponen. “I am forecasting that we will see toaster botnets—infected toasters,
34%
Flag icon
but we will see them getting infected for their computing power to mine cryptocurrencies of the future. That’s going to happen.”
34%
Flag icon
When I was growing up in West Virginia, it was considered smart to cancel home delivery of your newspaper when leaving for vacation so that burglars would not see a stack of papers in
34%
Flag icon
With connected homes, today’s smart burglar is able to hack inside a smart home network and monitor when people are home. They can gather precise data about the comings and goings of everybody living in the home.
34%
Flag icon
lookout for threats to the government’s and the military’s infrastructure.
34%
Flag icon
Gosler has earned numerous awards: the CIA’s National Intelligence Medal of Achievement, the DONOVAN Award, the Intelligence Medal of Merit, the CIA Director’s Award, and the Clandestine Service Medallion. He has also earned the Legion of Merit for exceptional meritorious performance, one of only two US military decorations awarded as a neck order. The other is the Medal of Honor—the highest award given by the US government.
34%
Flag icon
Gosler shares his fears of the potential for cyberattacks. While the rest of us enjoy technology (e-commerce, online banking, Uber), Gosler looks for the vulnerabilities:
34%
Flag icon
He cites the example of GPS and navigation. People in the navy once knew how to navigate by looking at the stars to determine where they are and what course to set. “Nobody knows how to do that now,” says Gosler. Our navy is bound to GPS to navigate the world, and so is just about everyone who owns a smartphone.
34%
Flag icon
But Gosler says that GPS is hackable. The damage could be benign—getting lost driving to a meeting—or it could be catastrophic. Imagine, for instance, if someone were able to hijack GPS systems and then direct military units on patrol toward enemy positions.
34%
Flag icon
Ultimately, Gosler believes that the prevention of the worst kind of cyberattacks, like those against power plants or air traffic control systems, falls into the domain of government.
35%
Flag icon
With the weaponization of code evolving to include infrastructure connected
35%
Flag icon
Gosler calls for us to recruit, train, and mobilize a new force of cyberwarriors.
35%
Flag icon
We need ten thousand to thirty thousand,” Gosler says. The government’s relative lack of top cybersecurity personnel is exacerbated by the choices that people with serious cyberskills have as they enter the workforce.
35%
Flag icon
For a computer scientist with cyberspecialization, government has to compete with higher-paying private sector jobs. Cybersecurity professionals in the United States already have an average annual salary of $116,000, nearly triple the average median income. Protecting corporate networks is better paying than protecting the GPS system.
35%
Flag icon
Plus, there is so much economic entanglement in the world today that if there’s a massive failure of US banking, that just doesn’t affect the United States. Or if there was a massive impact in European or Japanese banking, the global ripple effect of all that is pretty significant.”
35%
Flag icon
Gosler’s is not a lone voice. James R. Clapper, director of national intelligence, warned Congress in February 2015 that cyberattacks pose a greater long-term threat to national security than terrorism. Gosler wants the United States, with the government in the lead role and the private sector supporting it, to take on a massive effort to provide cyberdefense that protects the United States but also much of the rest of the world.
35%
Flag icon
from working in windowless rooms with access to the most sensitive information. And his tone is the same as most of those who have worked at the highest ranks of government. As a rule of thumb, the higher-ranking the person in government, the more apocalyptic his or her language about cyber.
35%
Flag icon
My Silicon Valley friends are more technologically optimistic than the military, CIA, and diplomatic officials, but that’s because they have not sat in the White House Situation Room and been witness to some of what has been averted. They know about the hacks against Sony, Saudi Aramco, and Target, and they know they have to beef up their own cyberdefenses, but most of them don’t know what we have missed.
35%
Flag icon
RUSSIA INVADING WITH BOTS AND BOOTS
35%
Flag icon
As protests stormed through the Ukrainian capital of Kiev at the beginning of 2014, the United States and European nations were watching closely to see if Russian troops were mobilizing at the Ukrainian border, primed for intervention or invasion. But long before
35%
Flag icon
Ukrainian computer networks years earlier had been infected by the cyberespionage package Ouroboros, named for the Greek mythological serpent pictured eating its own tail. The malware was “designed to covertly install a backdoor on a compromised system, hide the presence of its components, provide a communication mechanism with its [command and control] servers, and enable an effective data exfiltration mechanism.”
35%
Flag icon
Tracking this kind of activity requires looking for malware callbacks, which are basically the communications sent from infected or compromised computers back to the command-and-control server of the attacker.
35%
Flag icon
FireEye, a global network security company that analyzes millions of these communications annually, tracked the evolution of malware callbacks and found a correlation between the overall number of callbacks from Ukraine to Russia and “the intensification of the crisis between the two nations.”
35%
Flag icon
Even after the pro-Russian leader of Ukraine resigned and fled the country, the cyberattacks continued. Shortly before the Ukrainian presidential election in May 2014, the Ukrainian Security Service (SBU) announced that it had arrested a group of pro-Russian hackers who tried to disrupt the election results. According to SBU head Valentyn Nalyvaichenko, the hackers had compromised the main servers
35%
Flag icon
As SBU was foiling the attack on the night of the election, Russia’s state-owned Channel One reported that far right–sector candidate Dmitro Yarosh, who had received less than 1 percent of the vote, was leading the election with 37 percent of the vote, showing a screenshot of the Central Election Commission website. The screenshot was from the hacked site, and SBU noted that
35%
Flag icon
Pro-Russian hacktivist group CyberBerkut ultimately took credit for the hack, and Channel One did its job misinforming and manipulating the public.
35%
Flag icon
In 2007, Estonia relocated a controversial Soviet war memorial, the Bronze Soldier, from the center of the capital city of Tallinn to a military cemetery. To many Estonians, the monument, which honored Red Army liberators, was a symbol of Soviet occupation following World War II. To Estonia’s Russian community, the monument symbolized the Soviet victory over Nazi Germany. The move by Estonian authorities riled the Russian Federation
36%
Flag icon
Estonia’s foreign minister, Urmas Paet, accused the Kremlin of direct involvement. Eventually a Kremlin-backed patriotic youth group, Nashi (“Ours”), took responsibility for the series of DoS attacks:
36%
Flag icon
“We did not do anything illegal. We just visited the various Internet sites, over and over, and they stopped working.”
36%
Flag icon
Just before Russian tanks rolled into Georgia in August 2008, botnets were already on the offensive, inundating Georgian government