CyberStorm: An Apocalyptic Thriller
Rate it:
Open Preview
Read between May 29 - June 1, 2020
65%
Flag icon
“Iran’s military, the Islamic Revolutionary Guard Corps. It’s like a mix of the Communist Party, the KGB, and the mafia.
65%
Flag icon
the US has no technical edge when it comes to cyber.
65%
Flag icon
“The Iranians changed the rules of the game by attacking civilian targets using cyberweapons—the
65%
Flag icon
But what you don’t realize is how important it is that someone admitted to something.
66%
Flag icon
What is real? What is reality, anyway? I felt like I was hallucinating, my mind never quite able to take a firm hold of anything before skidding off.
67%
Flag icon
Our situation was bringing my priorities into sharp focus. I was shrugging off any artificialities, cleaning away all of the unimportant things I’d seen as essential before.
67%
Flag icon
This cyberwar felt like it had nothing to do with the future but was a part of the past, as if we were burrowing backwards into humans’ unending ability to inflict suffering upon one another. If you wanted to see into the future, you just had to look to the past.
68%
Flag icon
getting warm bodies together in one room helped with heating. Each human body, he’d explained, gave off about as much heat as a hundred-watt light bulb.
68%
Flag icon
We used less energy if we moved as little as possible, but we used much more, he’d whispered to me, if it was cold.
68%
Flag icon
“You can try to lay blame, but the central reason the Internet isn’t secure is because we don’t want it to be secure.”
68%
Flag icon
“You might think you want a secure Internet, but you really don’t, and that’s part of what makes this possible. In the end, a really secure Internet isn’t in the interest of the general public or software producers.” “Why wouldn’t consumers want a secure Internet?” “Because a truly secure Internet wouldn’t serve a common interest in freedom.”
68%
Flag icon
privacy being the cornerstone of freedom. More and more of our lives are moving into cyberspace, and we need to preserve what we have in the physical world as we move into the cyberworld. A perfectly secure Internet implies a trail of information somewhere, always tracking what you’re doing.”
68%
Flag icon
A completely secure Internet would be the same as a world with cameras on every corner and in every home, recording our every movement, but it would be even more intrusive. A perfect record of every interaction we had would give someone the ability to peer into our very thoughts.
68%
Flag icon
“The problem is that we’re trying to use the same technology—the Internet—for social networking and to run nuclear power plants. Those are two very different activities. We need to make it as secure as possible without giving some centralized power all the responsibility,” replied Rory in a tired voice. “What we’re talking about is a balancing act, an attempt to make it difficult to abuse the rights of individuals in the cyberworld of the future. Even this”—Rory waved his
68%
Flag icon
“Are you saying tech companies actively want an insecure Internet?” I said. “They want it to be secure from hackers,” replied Damon, “but they don’t want consumers to be secure from them. They hardwire back doors to update and modify software remotely—it’s a fundamental security risk they purposely create.
68%
Flag icon
“They give us all that software for free specifically so that we aren’t secure from them—so they can watch us, sell our information.” Damon looked at his computer screen. “If you don’t pay for a product, then you are the product.”
69%
Flag icon
“How does someone tracking my online shopping affect security?” asked Susie, perplexed. Damon shrugged. “It’s all the little loopholes, all the hooks and ways to track your activity and get inside your computer that are put there by software companies—that’s a lot of what hackers exploit.”
69%
Flag icon
“Electricity and water, for starters.” “The government doesn’t own that stuff anymore. Not their responsibility.”
69%
Flag icon
“In theory, yes, a nation’s military is supposed to protect its citizens and industry from other nations—establish a border and then protect it—but that doesn’t work anymore. Borders are difficult to define in cyberspace.” Rory took a deep breath. “Where the government and military used to be responsible for protecting a factory from attack by foreign national governments, now they’re asking private industry to take over that responsibility in cyberspace.” He shrugged. “But who’s going to pay for it? And can a private company really protect itself from a hostile nation? Can we as private ...more
69%
Flag icon
If you decide to use fire in battle, make sure that anything you need yourself isn’t flammable.’”
69%
Flag icon
The more things change, the more they stay the same.
69%
Flag icon
we’re about the most cyber-combustible country on the planet.”
70%
Flag icon
With the collapse of government authority, responsibility for justice had reverted to the tribal groups we’d spontaneously created.
71%
Flag icon
We were a nation of freeloaders, ninety-eight percent of us non-food-producers relying on the two percent who produced anything edible.
84%
Flag icon
I was looking at a Chinese army base, right in the center of Washington.
84%
Flag icon
all the lies and misinformation—it all made sense now. We’d been invaded.
87%
Flag icon
Catfish in the Shenandoah could get up to twenty or thirty pounds.
87%
Flag icon
Humans were violent. We were the apex predators, each one of us alive only because our ancestors had killed and eaten other animals, outcompeted everything else to survive.
87%
Flag icon
Technology couldn’t revert, but humans could, and they did so with startling ease and swiftness when the trappings of the modern world melted away. The tribal animal was always there, hidden just beneath our superficial lives of lattes and cell phones and cable TV.
89%
Flag icon
the body had two brains. One in your head, the one we called the brain, and the other circling your gut, what they called the ENS, the enteric nervous system,
90%
Flag icon
I’d always thought it was the human brain that had enabled us to conquer the planet, but really it was our stomachs and our ability to eat almost anything.
90%
Flag icon
What difference would it really make? China had become more Western, with its money and wealth of material goods, and the United States had become more like the Chinese, spying on our citizens. Maybe we’d reached a middle point; maybe it wouldn’t matter anymore who was in charge. “Chinese-American, or American-Chinese, huh?”
90%
Flag icon
honey was a strong antibiotic.
92%
Flag icon
The Chinese had been invited to set up a temporary camp in the middle of the city. It was only there for a few weeks, part of a massive international humanitarian relief effort to help the East Coast dig itself out from the “CyberStorm,” as the media had started to call it.
92%
Flag icon
In any disaster, there is always a delayed reaction, a gap the collective mind needs to comprehend something never seen before,
92%
Flag icon
From the cellar, I’d seen what I thought was a Chinese soldier, but in reality it was an Asian-American military man, of Japanese descent as it turned out. But my paranoid mind was only capable of seeing one thing.
92%
Flag icon
I’d decided it was the Chinese who had attacked us, so my mind framed everything I saw to reinforce that prejudice.
92%
Flag icon
The entire international community had rallied to support the United States once the scale of the disaster had become known, especially when facts about what had happened began to emerge.
93%
Flag icon
To muddy the waters, they’d released it at the same time the Anonymous hacker network had started its denial-of-service attack against FedEx. Forensic network investigators in China were able to unravel a chain of events that included a splinter group of their own People’s Liberation Army unleashing a cyberattack on the US at the same time.
93%
Flag icon
everything had started with a power failure in Connecticut, and they tracked this back to an attack by a Russian criminal group. The Russian gang had hacked into the backup systems of hedge fund firms in Connecticut, inserting a worm designed to modify backup financial records when the power at the firms’ primary locations went out. It was this criminal group that had initiated the first power outages in Connecticut in an attempt to siphon money from the hedge funds.
93%
Flag icon
So to up their chance of success, they’d done two things—initiated the attack on Christmas Eve, when few people would be working, and issued a false emergency alert about a bird flu outbreak. The bird flu warning had been far more effective at creating havoc than they’d expected, and like the power outage, it had cascaded through the system. The Russian gang had been too successful, and had turned themselves from mere criminals into terrorists.
93%
Flag icon
In the end, the CyberStorm was a swirling collision of simultaneous events in the cyber and physical domains. If it seemed a fantastic coincidence, it wasn’t. Millions of cyberattacks a day occurred all over the Internet, like waves rolling across an ocean. By simple laws of probability, a series of cyberattack waves had coalesced, the same way giant rogue waves appeared occasionally in the ocean, seemingly coming from nowhere to wreak havoc.
93%
Flag icon
With communications down and the storms pounding the city, reporters had no way to learn what was happening in Manhattan. CNN and Fox and other broadcasters had stationed themselves in Queens and the outer boroughs instead, reporting on conditions there. But nobody knew how desperate things were deep inside Manhattan.
93%
Flag icon
It was part natural disaster and part man-made disaster,
94%
Flag icon
The Russian criminals had only been targeting hedge fund firms in Connecticut, but they’d brought down the entire system.
95%
Flag icon
Compounding the problem was the loss of communications and computer networks—the rescue teams didn’t know where anything was, how to get it, or how to contact people, and the roads had been jammed up with snow and impassible.
95%
Flag icon
It wasn’t just the cyberattacks—thousands of telephone lines, electrical lines, and cell towers had been brought down by the snow and ice. The main water systems had only been down for a week, but in that time pipes had burst everywhere because of the extreme cold.
95%
Flag icon
the radar reports were artifacts from a viral infection of the air force radar computer systems at McChord Field in Washington State.
95%
Flag icon
before the CyberStorm, the term “cyberwar” had more of a metaphorical quality, like “the war on obesity.”
95%
Flag icon
Everything was interconnected, and big cities relied on intricate systems working perfectly, all the time. When they didn’t, people began to die very quickly. The loss of a few supporting legs created problems too big to fix, ending in gridlock with no graceful degradation to previous technologies or systems.