This Is How They Tell Me the World Ends: The Cyberweapons Arms Race
Rate it:
Open Preview
40%
Flag icon
unless Microsoft locked its systems down, a bad actor would inevitably use those same capabilities for a cyberattack of mass destruction or as a tool in brute authoritarianism. The stakes were only getting higher.
42%
Flag icon
Their work triggered equal parts admiration and disdain, particularly from Microsoft, which accused them of disclosing the bug before it had a patch. Project Zero’s team gave vendors ninety days. After that, they would dump their bugs online. Part of the goal was to light a big fat fire under vendors’ asses.
46%
Flag icon
Hackers weren’t hobbyists anymore. They weren’t playing a game. In short order, they had become the world’s new nuclear scientists—only nuclear deterrence theory did not so neatly apply. Cyberweapons didn’t require fissile material. The barrier to entry was so much lower; the potential for escalation so much swifter.
48%
Flag icon
This is what the new era of asymmetrical cyberwarfare looked like. The United States could strike a country’s critical infrastructure with cyberattacks, but when foreigners retaliated, U.S. businesses would be left holding the bag. The United States had no coherent response to the escalating nation-state cyberattacks on its systems.
50%
Flag icon
The U.S. grid is powered by local electricity distributors who are regulated state-to-state and not held to any federal security standards. The computer systems that powered the grid were designed long before cyberattacks became the norm; they were built for access, not security. Many ran older, expired software that software companies like Microsoft no longer patched. And these local grid operators had few of the resources that big power distributors like PG&E had at their disposal.
50%
Flag icon
“Virtually all of our civilian critical infrastructure—including telecommunications, water, sanitation, transportation, and health care—depend on the electric grid. The grid is extremely vulnerable to disruption caused by a cyber or other attack. Our adversaries already have the capability to carry out such an attack.
50%
Flag icon
“Under current conditions, timely reconstitution of the grid following a carefully targeted attack if particular equipment is destroyed would be impossible; and according to government experts, would result in widespread outages for at least months to two years
50%
Flag icon
By the end of 2012, DHS analysts had responded to 198 attacks on U.S. critical infrastructure systems—a 52 percent increase from the previous year.
50%
Flag icon
In a speech in 2012, Russia’s minister of telecommunications pushed for an international treaty banning computer warfare, while Russian officials back-channeled with their American counterparts to come up with a bilateral ban. But Washington dismissed Moscow’s bids, believing them to be a Russian diplomatic ploy to neuter the U.S. lead in cyberwarfare.
51%
Flag icon
Russian hackers infected the software updates that reached the industrial controllers inside hydroelectric dams, nuclear power plants, pipelines, and the grid, and were now inside the very computers that could unleash the locks at the dams, trigger an explosion, or shut down power to the grid.
51%
Flag icon
The Kremlin was signaling to Washington that if it retaliated on behalf of its Ukraine ally, or ever dared turn off the lights in Moscow, Russia had the ability to turn around and do the same. Call it mutually assured destruction for the internet era.
51%
Flag icon
VirusTotal, a kind of Google search engine for malware that researchers use to see where a piece of malware may have popped up before.
52%
Flag icon
All discovered BlackEnergy and KillDisk on their systems, but the attackers had broke into each network using different techniques and methods, almost like they were tinkering. In one case, the attackers downloaded their tools over time—1:20 P.M. every day. In another, they downloaded them rapid-style. “They tried one technique here, one technique there,” Yasinsky told me. “This was the scientific method in action.”
52%
Flag icon
The Ukraine blackouts were the nightmare scenario officials and cybersecurity specialists had forecast for years.
52%
Flag icon
By now, Russian hackers were so deeply embedded in the American grid and critical infrastructure, they were only one step from taking everything down. This was Putin’s way of signaling the United States. If Washington intervened further in Ukraine, if it pulled off a Stuxnet-like attack in Russia, they would take us down.
52%
Flag icon
Our grid was no less vulnerable than Ukraine’s; the only difference is we were far more connected, far more dependent, and in far greater denial.
53%
Flag icon
Trump would eliminate the White House cybersecurity coordinator completely.
53%
Flag icon
Dutch intelligence agencies had hacked into a university just off Moscow’s Red Square, where the SVR’s hackers—known to private security researchers as Cozy Bear—sometimes operated. The Dutch had managed to get inside the university’s security cameras and, using facial-recognition software, identified the SVR’s hackers by name.
53%
Flag icon
if the White House had followed through more closely, they might have caught those very same hackers in the beginning stages of their attack on our elections.
53%
Flag icon
now it’s not so cut-and-dried. We’ve all migrated to the same technology. You can no longer cut a hole in something without poking a hole in security for everyone.”
54%
Flag icon
By June 2014 the Kremlin had already dispatched two Russian agents, Aleksandra Y. Krylova and Anna V. Bogacheva, to the United States for a three-week recon tour. The two women bought cameras, SIM cards, and burner phones and devised “evacuation scenarios” in case American officials grew wise to the real impetus for their trip. Altogether the women visited nine states—California, Colorado, Illinois, Louisiana, Michigan, Nevada, New Mexico, New York, and Texas—to “gather intelligence” on American politics.
54%
Flag icon
the Internet Research Agency (IRA) set to work recruiting twentysomething news writers, graphics designers, and “search engine-optimization specialists” with $1,400 weekly salaries, more than four times what they could make anywhere else. On one floor, Russian trolls operating in rotating twelve-hour shifts created and deployed hundreds of fake accounts on Facebook and Twitter to pummel anyone who criticized their master, Vladimir Putin. On another floor, the IRA trolls waited for their daily assignment: a list of America’s political crises du jour,
54%
Flag icon
Demonstrators from the Heart of Texas group confronted pro-Muslim protesters across the street in a terrifying real-world standoff that Russia’s digital puppeteers were coordinating from five thousand miles away. Even the Russian trolls back in St. Petersburg couldn’t believe the Americans were so gullible.
54%
Flag icon
(FBI agents would later discover that “purple states” had become something of a Russian mantra in the 2016 interference).
54%
Flag icon
By the time the IRA campaign was fully revealed, years later, Putin’s trolls had reached 126 million Facebook users and received 288 million Twitter impressions—a staggering number, given that there are only 200 million registered voters in the United States, and only 139 million voted in 2016.
54%
Flag icon
Fancy Bear’s Russian hackers had sent John Podesta, Hillary Clinton’s campaign chairman, a fake Google alert, declaring that he had to change his Gmail password. Podesta had forwarded the email to the DNC’s IT staff for vetting, and in what would become the most tragic typo in American election history, a campaign aide wrote back, “This is a legitimate email.” He had intended to type “illegitimate,” but the damage was done.
54%
Flag icon
When Podesta entered his new password into the Russian’s fake Gmail log-in page, it gave Russian hackers access to sixty thousand emails, stretching back a decade, and a foothold to dig even deeper into the DNC and Hillary Clinton’s emails.
55%
Flag icon
“This is Watergate,” we both agreed. We called our editors at the Times, but it was difficult to get much momentum that June, in the midst of the most mind-boggling president campaign of our era.
55%
Flag icon
Guccifer 2.0’s hacking alias and Illuminati reference were all part of an elaborate Russian cover story.
55%
Flag icon
In the back and forth, Americans had lost sight of where these leaks were coming from.
55%
Flag icon
Months after Sanders ended his campaign and endorsed Clinton, several activists who ran Facebook pages for Bernie Sanders began to note a suspicious flood of hostile comments aimed at Clinton. “Those who voted for Bernie will not vote for corrupt Hillary!” they read. “The Revolution must continue! #NeverHillary.” “The magnitude and viciousness of it,” one Facebook administrator told my colleague Scott Shane, suggested that this was the work of a cold-blooded adversary with an agenda, but the sheer idea that any of this was a Russian campaign still struck many Americans as crazy Cold War–speak.
55%
Flag icon
Russian hackers would not necessarily even need to compromise the voting machines themselves; it would be far easier, and less visible, to simply digitally disenfranchise thousands of voters in traditionally blue urban counties in purple states. Even if they tweaked the data just a little, the Russians could cause fears of a rigged election and throw the election, and the country, into chaos. And chaos, Russian foreign policy experts said, was always the point.
55%
Flag icon
Mitch McConnell, the Senate majority leader, made it clear that he would not sign onto any bipartisan statement blaming the Russians; he dismissed the intelligence, admonished officials for playing into what he wrote off as Democrats’ spin, and refused to warn Americans about efforts to undermine the 2016 election.
56%
Flag icon
If Snowden had dribbled out descriptions of NSA programs and capabilities, the Shadow Brokers had just unleashed the capabilities themselves. The code and algorithms to exact mass destruction were now freely available to anyone with an ax to grind, or data to steal—the NSA’s worst nightmare essentially, the very scenario the VEP was designed to impede. But the cache was just a teaser, an advertisement for a much larger trove of NSA tools they planned to release to the highest bidder.
57%
Flag icon
none of the investigators at the FBI or the NSA’s counterintelligence arm, known as the Q Group, believed that the Shadow Brokers had done this for profit.
57%
Flag icon
Investigators came to believe this was a terror plot, unfolding in slow motion.
59%
Flag icon
the WannaCry attacks were different. The NSA had withheld Microsoft’s vulnerabilities for years, allowed its customers to get hacked, and once again, left it to Redmond to clean up the mess. Smith was apoplectic. It was time to hold the agency to account. And so, he took direct aim at the NSA in a manifesto.
59%
Flag icon
We need governments to consider the damage to civilians that comes from hoarding these vulnerabilities and the use of exploits.”
60%
Flag icon
he knew that as much as Russian meddling in Ukraine would continue in one form or another, the country was its digital test kitchen, not its end target.
60%
Flag icon
Two years later, Ukraine was still picking through the rubble. “The question we should all be asking ourselves,” he continued, “is what they will do next.”
60%
Flag icon
169 nation-states signed on to the Fourth Geneva Convention, agreeing to basic protections for wounded or captured military personnel, medical personnel, and nonmilitary civilians during wartime—rules that still hold today.
60%
Flag icon
happening. We’re seeing nations attack civilians even in times of peace.”
60%
Flag icon
The agreement Obama had reached with Xi Jinping to cease industrial espionage ended the day Trump kicked off his trade war with China.
60%
Flag icon
Trump’s abandonment of the Iran nuclear deal—the only thing keeping Iran’s hackers on good behavior—unleashed more Iranian cyberattacks on American interests than ever before.
60%
Flag icon
The Kremlin—which had yet to feel much of any pain for its 2016 election interference or its hacks on the Ukraine and U.S. grids—never stopped hacking our election ...
This highlight has been truncated due to consecutive passage length restrictions.
60%
Flag icon
EternalBlue had become a permanent feature in cyberattacks on American towns, cities, and universities, where local IT administrators oversee tangled, cross-woven networks made up of older, expired software that stopped getting patched long ago. Not a day went by in 2019, Microsoft’s security engineers told me, when they did not encounter the NSA’s cyberweapons in a new attack. “Eternal is the perfect name,”
61%
Flag icon
“These exploits are developed and kept secret by governments for the express purpose of using them as weapons or espionage tools. They’re inherently dangerous. When someone takes that, they’re not strapping a bomb to it. It’s already a bomb.”
61%
Flag icon
It was another sign that NOBUS—the presumption that “nobody but us” had the sophistication to find and exploit zero-days—was an arrogant one. Not only that, it was obsolete. The NSA’s advantage had hugely eroded over the last decade—not just because of Snowden and the Shadow Brokers and what had been learned from Stuxnet, but because we had grossly underestimated our enemies.
62%
Flag icon
“The Chinese use their best tools against their own people first because that’s who they’re most afraid of,” Jim Lewis, the former government official who tracked cyber threats, told me. “Then they turn those tools on us.”
62%
Flag icon
To help its prospects, Iran’s hackers took aim at Trump’s 2020 reelection campaign.