This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Rate it:
3%
Flag icon
We could now control our entire lives, economy, and grid via a remote web control. And we had never paused to think that, along the way, we were creating the world’s largest attack surface.
6%
Flag icon
In the United States, government hackers and spies hoarded zero-days for the sake of espionage, or in the event they might need to do what the Pentagon calls D5—“deny, degrade, disrupt, deceive, or destroy”—an adversary’s critical infrastructure in the event of war one day.
8%
Flag icon
Hackers, McManus explained, aren’t in it for money. At least, not in the beginning. They are in it for the rush, the one that comes with accessing information never meant to be seen.
8%
Flag icon
At their core, hackers are just natural tinkerers. They can’t see a system and not want to break it down to its very last bit, see where it takes them, and then build it back up for some alternate use. Where Watters saw a computer, a machine, a tool, McManus saw a portal.
12%
Flag icon
Most hackers didn’t realize there was legitimate value—in some cases six-figure value—in what they were doing. They were too focused on avoiding lawsuits.
17%
Flag icon
“Even if you found something, you could never be confident you found everything,” Gosler said. “That’s the awful nature of this business.”
17%
Flag icon
So long as computer operating systems accepted software updates without question, the report concluded, computers would be manipulated to accept trapdoors.
19%
Flag icon
“You begin to understand both the opportunity and the challenge,” Gosler told me, when you stop to consider that one terabyte is equivalent to a thirty-one-mile-high stack of paper, each sheet packed with single-spaced data.
19%
Flag icon
Pulling out critical, credible, actionable intelligence was getting to be nearly impossible as unprecedented flows of noisy, seemingly unrelated data made its way through an endless maze of digital pipes back to the Fort. Solving for Big Data would consume U.S. intelligence agencies for decades.
33%
Flag icon
“You’ll wake up one day and find yourself labeled a terrorist,” Mansoor told me in 2016. “Despite the fact you don’t even know how to put a bullet in a gun.”
45%
Flag icon
Engineers who coded Silicon Valley’s apps and services no longer needed to reverse-engineer a system down to its kernel, or venture far down the stack, to the metal. Increasingly, they were just skimming the surface, and in the process losing the depth of understanding required to find and develop the best zero-day exploits.
53%
Flag icon
When it came to defense, the nation with the most advanced hacking capabilities in the world was reduced to a printout, like the rest of us.
53%
Flag icon
The world soon learned just how neglected OpenSSL had become. The code played a critical role in securing millions of systems, and yet it was maintained by a single engineer working on a shoestring annual budget of $2,000—
53%
Flag icon
After all, it was his job to come up with last-minute desperate solutions to impossible problems created by other fucking people.
53%
Flag icon
“Governments are starting to say, ‘In order to best protect my country, I need to find vulnerabilities in other countries,’ ” Schmidt told me before his passing. “The problem is that we all fundamentally become less secure.”
53%
Flag icon
“Unfortunately, dancing with the devil in cyberspace is pretty common.”
54%
Flag icon
You can no longer cut a hole in something without poking a hole in security for everyone.”
54%
Flag icon
Attaching a process gave the White House some semblance of accountability, but in practice it was a high-stakes game of chicken that was hurtling out of control.
59%
Flag icon
Hutchins’ last-second heroics made him a target for U.S. feds, who picked him up a few months later at the Las Vegas airport, en route home from Def Con, and charged him with writing malware early on his career. The case was a reminder to hackers everywhere that no good deed goes unpunished.
60%
Flag icon
What we need is an approach that governments will adopt that says they will not attack civilians in times of peace. They will not attack hospitals. They will not attack the electrical grid. They will not attack the political processes of other countries; that they will not use cyberweapons to steal the intellectual property of private companies. That they instead will work together to help each other and the private sector respond when there are cyberattacks. In fact, what we really need is not only to recognize the need for rules but, frankly, to know when others are violating them.”
60%
Flag icon
And yet, instead of a multilateral, or even bilateral, treaty, the United States went the other way. At the very moment Smith was wrapping up his speech in Geneva that November 9, 2017, the Pentagon’s hackers—unbeknownst to the commander-in-chief—were busy laying trapdoors and logic bombs in the Russian grid.
67%
Flag icon
We too have forgotten that the internet is borderless. There are no red lines. We are not immune from our own attacks. The enemy is indeed a very good teacher. The cyberarms market is no longer ours to monopolize. We can no longer keep our cyberweapons safe. They can, and have, been turned on us. The vulnerabilities are ours, too. We just have more of them
68%
Flag icon
“Everything can be intercepted,” he told me. “Everything can be captured. People have no way of verifying the integrity of these systems. We weren’t thinking about this back then. But the fact is,” he added ruefully, “everything is vulnerable.”
69%
Flag icon
In our brave new world, these unglamorous open-source protocols have become critical infrastructure and we barely bothered to notice.
70%
Flag icon
They say security is only as good as the weakest link, and we continue to be the weakest link. We are still clicking on malicious links and email attachments. Even when vulnerabilities get fixed, we are not patching them quickly enough. Cybercriminals and nation-states regularly exploit unpatched software. The day patches become available is the day you see the bugs exploited the most. Why? Because we have a horrible track record of running our software updates.