POPULARITY
This episode of the Cybersecurity Defenders podcast is a two-part mini-series about the greatest cyber attack ever conceived: Stuxnet. Joining to help us tell the story is Kim Zetter, Journalist and Author - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel in a collaborative effort known as Operation Olympic Games. The program, started during the Bush administration, was rapidly expanded within the first months of Barack Obama's presidency. This episode was written by Nathaniel Nelson, narrated by Christopher Luft, and produced by the team at LimaCharlie.
Rick Howard, N2K CyberWire's Chief Analyst and Senior Fellow, discusses the meaning of cybersecurity materiality. References: Amy Howe, 2024. Supreme Court strikes down Chevron, curtailing power of federal agencies [Blog] Cydney Posner, 2023. SEC Adopts Final Rules on Cybersecurity Disclosure [Explainer]. The Harvard Law School Forum on Corporate Governance. Cynthia Brumfield, 2022. 5 years after NotPetya: Lessons learned Analysis]. CSO Online. Eleanor Dallaway, 2023. Closed for Business: The Organisations That Suffered Fatal Cyber Attacks that Shut Their Doors For Good [News]. Assured. Gary Cohen, 2021. Throwback Attack: Chinese hackers steal plans for the F-35 fighter in a supply chain heist [Explainer]. Industrial Cybersecurity Pulse. James Pearson, 2022. Russia downed satellite internet in Ukraine [News]. Reuters. Katz, D., 2021. Corporate Governance Update: “Materiality” in America and Abroad [Essay]. The Harvard Law School Forum on Corporate Governance. Kim Zetter, 2014. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon [Cybersecurity Canon Hall of Fame Book]. Goodreads. Lizárraga, C.J., 2023. Improving the Quality of Cybersecurity Risk Management Disclosures [Essay]. U.S. Securities and Exchange Commission. MATTHEW DALY, 2024. Supreme Court Chevron decision: What it means for federal regulations [WWW Document]. AP News. Rick Howard. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon [Book Review]. Cybersecurity Canon Project. Rick Howard, 2021. Using cyber sand tables to study the DNC hack of 2016. [Podcast]. The CyberWire. Rick Howard, 2022. Cyber sand table series: OPM. [Podcast and Essay]. The CyberWire. Staff, 2020. Qasem Soleimani: US strike on Iran general was unlawful, UN expert says [Explainer]. BBC News. Staff, 2023. Final Rule: Cybersecurity Risk Management, Strategy, Governance, and Incident Disclosure [Government Guidance]. U.S. Securities and Exchange Commission. Staff, 2024. Number of Public Companies v. Private: U.S. [Website]. Advisorpedia. Learn more about your ad choices. Visit megaphone.fm/adchoices
Kim Zetter, journalist and author of the book Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon.
Rick Howard, N2K's CSO and The CyberWire's Chief Analyst and Senior Fellow, presents the argument for why the SEC was misguided when it charged the SolarWinds CISO, Tim Brown, with fraud the after the Russian SVR compromised the SolarWinds flagship product, Orion. Our guests are, Steve Winterfeld, Akamai's Advisory CISO, and Ted Wagner, SAP National Security Services CISO. References: Andrew Goldstein, Josef Ansorge, Matt Nguyen, Robert Deniston, 2024. Fatal Flaws in SEC's Amended Complaint Against SolarWinds [Analysis]. Crime & Corruption. Anna-Louise Jackson, 2023. Earnings Reports: What Do Quarterly Earnings Tell You? [Explainer]. Forbes. Brian Koppelman, David Levien, Andrew Ross Sorkin, 2016 - 2023. Billions [TV Show]. IMDb. Dan Goodin, 2024. Financial institutions have 30 days to disclose breaches under new rules [News]. Ars Technica. David Katz, 021. Corporate Governance Update: “Materiality” in America and Abroad [Essay]. The Harvard Law School Forum on Corporate Governance. Jessica Corso, 2024. SEC Zeroes In On SolarWinds Exec In Revised Complaint [Analysis]. Law360. Johnathan Rudy, 2024. SEC files Amended complaint against SolarWinds and CISO [Civil Action]. LinkedIn. Joseph Menn, 2023. Former Uber security chief Sullivan avoids prison in data breach case [WWW DocumentNews]. The Washington Post. Kim Zetter, 2014. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon [Book]. Goodreads. Kim Zetter, 2023. SEC Targets SolarWinds' CISO for Rare Legal Action Over Russian Hack [WWW Document]. ZERO DAY. Kim Zetter, 2023. SolarWinds: The Untold Story of the Boldest Supply-Chain Hack [Essay]. WIRED. Rick Howard, 2022. Cyber sand table series: OPM [Podcast]. The CyberWire - CSO Perspectives Podcast. Rick Howard, 2023. Cybersecurity First Principles: A Reboot of Strategy and Tactics [Book]. Goodreads. Pam Baker, 2021. The SolarWinds hack timeline: Who knew what, and when? [Timeline]. CSO Online. Staff, 2009. Generally Accepted Accounting Principles (Topic 105) [Standard]. PWC. Staff. 30 October 2023. SEC Charges SolarWinds and Chief Information Security Officer with Fraud, Internal Control Failures [Website]. The U.S. Securities and Exchange Commision. Staff, 31 October 2023. Securities and Exchange Commission v. SolarWinds Corporation and Timothy G. Brown, No. 23-civ-9518 (SDNY) [Case]. The Securities and Exchange Commission. Staff, 29 March 2024. Cooley, Cybersecurity Leaders File Brief Opposing SEC's SolarWinds Cyberattack Case [Press Release]. Cooley. Stephanie Pell, Jennifer Lee , Shoba Pillay, Jen Patja Howell, 2024. The SEC SolarWinds Enforcement Action [Podcast]. The Lawfare Podcast.
This episode of the Cybersecurity Defenders podcast is the second part in a two-part mini-series about the greatest cyber attack ever conceived: Stuxnet.Joining to help us tell the story is Kim Zetter, Journalist and Author - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon.If you have not heard the first episode it is recommended that you do so before listening to this one. You can listen to the first episode here: Stuxnet (Part 1)Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel in a collaborative effort known as Operation Olympic Games. The program, started during the Bush administration, was rapidly expanded within the first months of Barack Obama's presidency.This episode was written by Nathaniel Nelson, narrated by Christopher Luft, and produced by the team at LimaCharlie.The Cybersecurity Defenders Podcast: a show about cybersecurity and the people that defend the internet.
This episode of the Cybersecurity Defenders podcast is the first part in a two-part mini-series about the greatest cyber attack ever conceived: Stuxnet. Joining to help us tell the story is Kim Zetter, Journalist and Author - Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon.Stuxnet is a malicious computer worm first uncovered in 2010 and thought to have been in development since at least 2005. Stuxnet targets supervisory control and data acquisition (SCADA) systems and is believed to be responsible for causing substantial damage to the nuclear program of Iran. Although neither country has openly admitted responsibility, the worm is widely understood to be a cyberweapon built jointly by the United States and Israel in a collaborative effort known as Operation Olympic Games. The program, started during the Bush administration, was rapidly expanded within the first months of Barack Obama's presidency.This episode was written by Nathaniel Nelson, narrated by Christopher Luft, and produced by the team at LimaCharlie.The Cybersecurity Defenders Podcast: a show about cybersecurity and the people that defend the internet.
Welcome to podcast 118 of the Security Box. On this show, we're going to talk about books. Not all books may be covered due to time constraints, but we'll list all of the ones here. Question is, what kind of books? These books are dealing with security in one way or another. The list may contain multiple books, and are split up in to authors. We'll have this in a multi-list format where the main list is in author, and sublist will have the books. Books may be available via other sources that the blind and disabled can access including Bookshare, the NLS, and apple books. The NLS Bard page can only be accessed by eligible patrons and will not be linked here. All linked books come from Amazon or its affiliates, but you can search the book titles separately to find the price that fits your budget unless bard has it already. From this list, we do know that BARD only has one book, but that could change. Check Bard often, you never know what will be posted there. Besides that, we'll have news, notes and more. Now, here are the books and thanks for listening! Mark Russinovich Zero Day: A Jeff Aiken Novel (Jeff Aiken Series Book 1) Trojan Horse: A Jeff Aiken Novel (Jeff Aiken Series Book 2) Rogue Code: A Jeff Aiken Novel Scott Schober Hacked Again Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home Senior Cyber: Best Security Practices for Your Golden Years Kim Zetter Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Mikko Hyponnen
This episode is the second part of our three-part series featuring the highlights of EEI 2022, our annual thought leadership forum. In this episode, you will hear conversations about topics including electric transportation, ESG, and cybersecurity featuring Michael Webber, Chief Technology Officer, Energy Impact Partners, and Josey Centennial Professor in Energy Resources at the University of Texas at Austin; EEI Director of Electric Transportation Kellen Schefter; Dan Hahn, Partner – Energy, Sustainability, and Infrastructure at Guidehouse; Deloitte's Specialist Lead – EV Strategy and Planning Adrian Rouse and Vice Chair of U.S. Power, Utilities & Renewables Leader Jim Thompson; and Kim Zetter, journalist and author of Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Also featured are virtual remarks by Department of Transportation Secretary Pete Buttigieg and highlights from a keynote featuring Duke Energy Chair, President, and CEO Lynn Good and Director of the Cybersecurity and Infrastructure Security Agency Jen Easterly.
In a world where computer hacking has become increasingly more sophisticated, how does an organization ensure it does not find itself the next victim of a financial cybercrime attack? In this episode of Moody's Talks: KYC Decoded, leading investigative journalist and author of the recently published book The Lazarus Heist, Geoff White, breaks down the events of the 2016 Bangladesh bank heist, commonly attributed to North Korea's cyber unit, the Lazarus Group. Listen along for a riveting account of money laundering fueled by cybercrime, the devastating consequences such crimes can bring about for victims, and the systems and controls needed to combat it. For additional resources, make sure to check out:The Lazarus Hei$t BBC podcast seriesGeoff White's 2020 book, Crime Dot Com: From Viruses to Vote Rigging, How Hacking Went GlobalCountdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim ZetterTo learn how to prevent financial crime in your organization, please visit kyc.moodys.io.
Enjoy this sample of CSO Perspectives, a CyberWire Pro podcast. Like what you hear? Consider subscribing to CyberWire Pro for $99/year. Learn more. On this episode, host Rick Howard discusses if the first principles theories prevent material impact in the real world, such as the latest SolarWinds attack. Previous episodes referenced: S1E6: 11 MAY: Cybersecurity First Principles S1E7: 18 MAY: Cybersecurity first principles: zero trust S1E8: 26 MAY: Cybersecurity first principles: intrusion kill chains. S1E9: 01 JUN: Cybersecurity first principles - resilience S1E11: 15 JUN: Cybersecurity first principles - risk S2E3: 03 AUG: Incident response: a first principle idea. S2E4: 10 AUG: Incident response: around the Hash Table. S2E7: 31 AUG: Identity Management: a first principle idea. S2E8: 07 SEP: Identity Management: around the Hash Table. Other resources: “A BRIEF HISTORY OF SUPPLY CHAIN ATTACKS,” by Secarma, 1 September 2018. “Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers,” by 365 Defender Research Team and the Threat Intelligence Center (MSTIC), Microsoft, 18 December 2020. “A Timeline Perspective of the SolarStorm Supply-Chain Attack,” by Unit 42, Palo Alto Networks, 23 December 2020. “Cobalt Strike,” by MALPEDIA. “Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon,” by Kim Zetter, Published by Crown, 3 June 2014. “Cybersecurity Canon,” by Ohio State University. “FireEye shares jump back to pre-hack levels,” Melissa Lee, CNBC, 23 December 2020. "Implementing Intrusion Kill Chain Strategies by Creating Defensive Campaign Adversary Playbooks," by Rick Howard, Ryan Olson, and Deirdre Beard (Editor), The Cyber Defense Review, Fall 2020. “Orion Platform,” by SolarWinds. “Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers,” by Andy Greenberg, Published by Doubleday, 7 May 2019. “Solarstorm,” by Unit 42, Palo Alto Networks, 23 December 2020. “The Cybersecurity Canon: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon,” by Rick Howard, The Cybersecurity Canon Project, 28 January 2015. “Using Microsoft 365 Defender to protect against Solorigate,” by the Microsoft 365 Defender Team, 28 December 2020.
At Harris Bricken, we keep close tabs on what is happening around the world, and we know that our friends and clients do, as well. We are happy to provide this podcast series: Global Law and Business, hosted by international attorneys Fred Rocafort and Jonathan Bench, where we look at the world by talking with business leaders, innovators, service providers, manufacturers, and government leaders around the globe. In Episode #97, we are joined by Jack Rhysider, host of the Darknet Diaries podcast. We discuss: Jack's background as an information security professional The passion for podcasts that led to Darknet Diaries How the proliferation of electronic devices both facilitates and compromises security Hackers The need for legal upgrades to better address cyber threats Listening, and watching recommendations from: Jack Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers, by Andy Greenberg Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, by Kim Zetter This Is How They Tell Me the World Ends: The Cyberweapons Arms Race, by Nicole Perlroth Black Duck Eggs (Darknet Diaries) Project Raven (Darknet Diaries) Jonathan Alula Adventures Fred MDMA Could Help Cure PTSD (VICE News) We'll see you next week for another exciting and informative episode when we sit down with Jerry Chidester, board-certified plastic surgeon!
Rick discusses if the first principles theories prevent material impact in the real world, such as the latest SolarWinds attack. Previous episodes referenced: S1E6: 11 MAY: Cybersecurity First Principles S1E7: 18 MAY: Cybersecurity first principles: zero trust S1E8: 26 MAY: Cybersecurity first principles: intrusion kill chains. S1E9: 01 JUN: Cybersecurity first principles - resilience S1E11: 15 JUN: Cybersecurity first principles - risk S2E3: 03 AUG: Incident response: a first principle idea. S2E4: 10 AUG: Incident response: around the Hash Table. S2E7: 31 AUG: Identity Management: a first principle idea. S2E8: 07 SEP: Identity Management: around the Hash Table. Other resources: “A BRIEF HISTORY OF SUPPLY CHAIN ATTACKS,” by Secarma, 1 September 2018. “Analyzing Solorigate, the compromised DLL file that started a sophisticated cyberattack, and how Microsoft Defender helps protect customers,” by 365 Defender Research Team and the Threat Intelligence Center (MSTIC), Microsoft, 18 December 2020. “A Timeline Perspective of the SolarStorm Supply-Chain Attack,” by Unit 42, Palo Alto Networks, 23 December 2020. “Cobalt Strike,” by MALPEDIA. “Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon,” by Kim Zetter, Published by Crown, 3 June 2014. “Cybersecurity Canon,” by Ohio State University. “FireEye shares jump back to pre-hack levels,” Melissa Lee, CNBC, 23 December 2020. "Implementing Intrusion Kill Chain Strategies by Creating Defensive Campaign Adversary Playbooks," by Rick Howard, Ryan Olson, and Deirdre Beard (Editor), The Cyber Defense Review, Fall 2020. “Orion Platform,” by SolarWinds. “Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers,” by Andy Greenberg, Published by Doubleday, 7 May 2019. “Solarstorm,” by Unit 42, Palo Alto Networks, 23 December 2020. “The Cybersecurity Canon: Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon,” by Rick Howard, The Cybersecurity Canon Project, 28 January 2015. “Using Microsoft 365 Defender to protect against Solorigate,” by the Microsoft 365 Defender Team, 28 December 2020.
Kim Zetter is a former staff writer at WIRED and author of the seminal cybersecurity book “Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon.” Her work has appeared in The New York Times, POLITICO, The Washington Post and regularly in her Substack newsletter, “Zero Day.” In this episode, Kim talks about her approach to reporting, what sparked her Stuxnet investigation and how the discovery of that malware fundamentally altered our global cybersecurity conversation.Why you should listen:* Hear from one of the most influential and knowledgeable journalists writing about cybersecurity today.* Get her take on some of the biggest security stories of 2021 such as Colonial Pipeline and the Pegasus Project.* Learn more about the key policy debates around election security and critical infrastructure protections.Key Quotes:* “Stuxnet really helped shine a light on industrial control systems as a target.”* “We focus too much on the stuff that makes the headlines and completely ignore the innocuous things that you're downloading onto your phone .... Those things are spying on you, as well.”* “The Obama administration was the first administration to [make] cyber a priority, but they didn't really put critical infrastructure as a priority in the sense of using the government's weight to force security on critical infrastructure. We're actually only seeing that in this last year … in the wake of Colonial Pipeline.”* “When we saw Russia trying to interfere in 2016, that woke up DHS that someone, somewhere needed to have some kind of influence over election officials.”Links:* www.synack.com* https://zetter.substack.com/* https://www.nytimes.com/2018/09/26/magazine/election-security-crisis-midterms.html
This week's OODAcast is with Kim Zetter, an incredibly well respected journalist who has been covering cybersecurity related issues for two decades. Matt Devost talks with Kim about a wide variety of cyber-related issues including a deep dive into Stuxnet and the implications for today's security environment. Kim also shares details as to how she got into the field and how she developed relationships with the hacker community via her longstanding attendance at Def Con. Kim is an award-winning investigative journalist and author who has covered cybersecurity and national security for more than a decade, most recently as a staff writer for WIRED. Her work has also appeared in the New York Times Magazine, Politico, Washington Post and others. She has broken numerous stories about NSA surveillance, WikiLeaks, and the hacker underground, including an award-winning series about security problems with electronic voting machines. She has four times been voted one of the top ten security journalists in the U.S. by her journalism peers. She's considered one of the world's experts on Stuxnet, a virus/worm used to sabotage Iran's nuclear program, and wrote an acclaimed book on the topic – Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon. Additional Resources: Countdown to Zero Day book Kim's Zero Day Substack Def Con hacker conference
In just the last couple of months, cybercriminals have hacked several U.S. companies using different types of ransomware, paralyzing a petroleum pipeline, compromising a meat manufacturer, delaying ferry operations between Massachusetts' mainland and Martha's Vineyard and Nantucket, and even targeting K-12 schools. Join us as host Kerri Miller talks to two cybersecurity experts about threats, the risks of corporate hacking, what can be done to prevent them and what can be done to protect those who are most vulnerable.Guests: Lauren Zabierek is the executive director of the Cyber Project at the Belfer Center for Science and International Affairs at Harvard Kennedy School. Kim Zetter is an investigative journalist who covers privacy, computer security and national security. She is also author of the book “Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon.”
Welcome to the first podcast of 2020, podcast 333. Below, please find a list of items and links where applicable as the topics of the podcast are listed below. Breaches galore, the epidemic of whats happened in the last decade. Are we really looking for more trouble, or will it slow down? Freshbooks: thank you so much for giving me a great reason for talking about you today. On this podcast, I talk about how I had to reinstall the Freshbooks app, and how easy it was to reauthenticate with my account. I was afraid that I was needing to grab my 20 character password and paste in the password field. Not anymore! Twit.tv has a new sponsor on their list that spomnsors segments on Security Now. Sadly, I can't take advantage of it at this time, but it looks like something we could've and should've had many years ago. Learn about privacy.com and see if it will meet your needs. Michael in Indiana and I talked about software and reminisced about the old days of how downloading the wrong software wasn't fatal, but just a havoc. Today, this isn't the case. I mention Stuxnet as an example of software that was developed and it did some real world damage. Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: by Kim Zetter is the name of the book and its author. I read this through Kindle and I may have talked about this on my podcast when I did. If this is the first actual weapon that destroyed data and things that were going on, is something else being developed we yet don't know about? As usual, our contact information is at the end of the program, and I hope you enjoy this first podcast. I'll be back on another edition very soon. Thanks so much for listening to this 71 minute program!
In this episode of the Social Currency podcast, we interview “Threat Matrix” podcast host, former Microsoft PR lead and now NYU professor, Kristina Libby. Prepare for war. We hit on hidden agendas, the AI war, the responsibility of social platforms to combat fake news, and the line between PR and propaganda. In our discussion with Kristina, we touch on: Cyber security and what we should all be doing now to protect ourselves The responsibility of social platforms to combat fake news The line between PR and propaganda Winning the AI war The future of social media Links we reference in the show are below: Where to find Kristina: https://twitter.com/matrix_threat https://twitter.com/KristinaLibby Books Referenced in this Episode: Traction: How Any Startup Can Achieve Explosive Customer Growth: https://amzn.to/2JfgD7s LikeWar: The Weaponization of Social Media: https://amzn.to/2xnSPIY Weapons of Math Destruction: How Big Data Increases Inequality and Threatens Democracy: https://amzn.to/2IWjxiG Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon: https://amzn.to/2FFBHTy Forums & Sites Referenced in this Episode: Nancy Pelosi Doctored Video: https://www.reddit.com/r/TechNewsToday/comments/bta9e0/a_doctored_video_of_nancy_pelosi_shows_social/ Twitterbots: Anatomy of a Propaganda Campaign: https://www.symantec.com/blogs/threat-intelligence/twitterbots-propaganda-disinformation The Beginners Guide to Not Getting Hacked: https://www.dontclickonthat.com/
Podcast: Digital BondEpisode: Unsolicited Response Podcast – Interview with Kim Zetter from S4x15Pub date: 2015-02-17We had Kim Zetter on stage for an interview at ICSage during S4x15 Week to discuss her new book: Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon. This first 2015 episode of the Unsolicited Response Podcast features that interview. The podcast includes: Who was the target audience for the book Why […]The podcast and artwork embedded on this page are from Dale Peterson, which is the property of its owner and not affiliated with or endorsed by Listen Notes, Inc.
On today's episode of Loud & Clear, Brian Becker and John Kiriakou are joined by Dr. Gerald Horne, a professor of history at the University of Houston and author of many books, including “The Apocalypse of Settler Colonialism: The Roots of Slavery, White Supremacy and Capitalism in Seventeenth Century North America and the Caribbean.”President Trump is heading to the border today to speak with Customs and Border Patrol officials about the so-called “crisis” there, even though those same officials aren’t being paid because of the government shutdown. Meanwhile, Venezuelan President Nicolas Maduro was sworn in today for a new term as the U.S.-backed regime change effort targeting his government continues, and Brazil’s new president, Jair Bolsonaro, moved today to withdraw his country from the UN global migration pact. Thursday’s weekly series “Criminal Injustice” is about the most egregious conduct of our courts and prosecutors and how justice is denied to so many people in this country. Paul Wright, the founder and executive director of the Human Rights Defense Center and editor of Prison Legal News (PLN), and Kevin Gosztola, a writer for Shadowproof.com and co-host of the podcast Unauthorized Disclosure, join the show. President Trump said today that he will “almost definitely” declare a national emergency soon to secure funding for his border wall. He made the comment as he departed today to Texas to meet with Customs and Border Patrol officials and continue making the case for hardline anti-immigrant policies. Brian and John speak with Isabel Garcia, co-founder of Coalición de Derechos Humanos. The US has accused Russia’s Kaspersky Lab of working with Russian spies on cyberwarfare. But Politico is reporting that Kaspersky actually helped catch an NSA data thief, even though the US had completely missed the theft. Kim Zetter, the author of the book “Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon,” and a prolific journalist who has contributed to Politico, the Washington Post, the New York Times, CNN, NPR, and other outlets, joins the show. The New York Times today issued a correction--a retraction would be more appropriate--to a front-page story yesterday saying that former Trump campaign chairman Paul Manafort had shared polling data with a Russian contact for passage to a Russian oligarch. That information was untrue. Manafort had shared the information for passage to two Ukrainian politicians with whom he had had a business relationship. The true story undercuts any accusation of collusion between the Trump campaign and Russia. Dan Kovalik, a human rights and labor lawyer who is the author of the new book “The Plot to Control the World: How the US Spent Billions to Change the Outcome of Elections Around the World,” joins Brian and John. It’s time again for our regular weekly segment Veterans for Peace, where we’ll discuss contemporary issues of war and peace that affect veterans, their families, and the country as a whole. Gerry Condon, a Vietnam-era veteran and war resister who has been a peace and solidarity activist for almost 50 years, currently as national president of Veterans for Peace, joins the show.The UK’s departure from the European Union is fast approaching. The British parliament is now conducting the official debate on the Brexit deal ahead of a vote next week. But Prime Minister Theresa May may not have the votes necessary to pass the terms of the deal, and was dealt a blow when members of her own Conservative Party revolted to help pass a motion limiting her options in the event that the deal is rejected. Brian and John speak with Alexander Mercouris, the editor-in-chief of The Duran.
Neste episódio, Paulo Sant’anna recebe Alan Oliveira, que é um dos tradutores do livro Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon de Kim Zetter. Além disso, ele comenta sobre a relevância do Stuxnet como a primeira arma digital, e como essa primeira arma pode levar à criação de outras e o que podemos esperar deste novo cenário. Em adição, correlaciona os fatos ocorridos com a maneira como o ataque foi realizado e o que ele representa no contexto da segurança da informação de sistema cibernéticos. No livro, a jornalista especializada em cibersegurança conta a história por traz do vírus que sabotou os esforços iranianos para criação de um programa nuclear, mostrando como sua criação inaugurou um novo tipo de guerra, em que ataques digitais podem ter o mesmo poder destrutivo de uma bomba física. Sobre o livro O livro Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon descreve o funcionamento do malware Stuxnet, que atacou centrífugas de enriquecimento de urânio do Programa Nuclear Iraniano, mas também discute todos os aspectos táticos e estratégicos associados àquela que é considerada a primeira arma digital de guerra já usada numa ação contra um Estado nacional. O livro contém todos os elementos de um thriller que captura a atenção do leitor desde a primeira página. O livro trata do surgimento da primeira arma digital do mundo, o Stuxnet, desde suas origens nos corredores da Casa Branca até a execução do ataque a uma usina atômica no Irã. Sua existência começou a se tornar pública em 2010, após inspetores da Agência Internacional de Energia Atômica (IAEA) perceberem que as centrífugas de uma usina iraniana de enriquecimento de urânio estavam falhando em um ritmo sem precedentes por razões absolutamente desconhecidas. Cinco meses depois – em um evento aparentemente não relacionado -, uma empresa de segurança em Belarus foi chamada para solucionar problemas em computadores no Irã. Nesses computadores eles encontraram um malware que, inicialmente, pensaram se tratar de uma ameaça simples e rotineira; mas análises mostraram se tratar de algo misterioso, e de complexidade sem precedentes. O livro cita em detalhes o trabalho realizado por analistas de segurança da informação e analistas de sistemas de controle industrial (SCADA) para dissecar e desvendar esse malware. Além disso, “Countdown” fala sobre a Guerra Cibernética, seu desenvolvimento e o mercado de compra e venda de códigos maliciosos. Sobre o entrevistado Alan Oliveira é Engenheiro, mestre em Engenharia Eletrônica na área de sistemas inteligentes e doutorando na UFRJ. Atuou por 7 anos como oficial da marinha nas áreas de sistemas de armas e comunicações. Atualmente é professor na Marinha do Brasil, onde ministra as disciplinas de controle de sistemas, guerra eletrônica e sistemas de comunicação. Desenvolve em seu doutorado uma pesquisa voltada para a segurança de sistemas de controle e automação.
In 2012, Defense Secretary Leon Panetta warned that the United States was facing the possibility of a "cyber" Pearl Harbor and was increasingly vulnerable to foreign computer hackers who could dismantle the nation's power grid, transportation system, financial networks and government. Since then, we have seen Iran attack US financial institutions and gain control of a New York dam. ISIS has released a kill list complete with stolen US federal employee information. Russia has attacked our democratic system through a combination of cyber theft and massive botnets used to propagate fake news. And North Korea is alleged to be behind a series of attacks including Sony Entertainment and culminating in the global WannaCry ransomware attack in May. Why have we been unable to defend against these attacks? What is being done to prevent and protect us from potential future threats? The “WannaCry” attack and most recent “Petya” attack have caused damage on a global scale, and have even taken lives. Further, it appears such attacks have made use of stolen NSA cyber weapons previously distributed on the dark web and available for sale. Nicole Perlroth, cyber security reporter for The New York Times, will discuss these attacks and what to expect for the future of cyber warfare. SPEAKER: Nicole Perlroth Reporter, The New York Times MODERATOR: Kim Zetter Author, Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon For more information about this event please visit: http://www.worldaffairs.org/event-calendar/event/1749
In this episode, we took advantage of the new world-wide federal holiday to watch the sci-fi action blockbuster Independence Day (the good one from 1996). How effective are nuclear weapons against 15 mile wide spaceships? Are aliens keeping tabs on Earth’s nuclear stockpiles? How did Jeff Goldblum write a computer virus that works on alien technology? Tim and Joel answer these questions and more. Before Elvis left the building, we recommend reading -Michael Rogin, Independence Day, or How I Learned to Stop Worrying and Love the Enola Gay, (British Film Institute, 1998) http://www.worldcat.org/title/independence-day-or-how-i-learned-to-stop-worrying-and-love-the-enola-gay/oclc/39547508 -James Harris, “The Oral History of the President’s Speech in ‘Independence Day,’” Complex Media, June 23, 2016, http://www.complex.com/pop-culture/2016/06/presidents-speech-in-independence-day-oral-history -Kim Zetter, Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon (Crown publishers, 2014) Also check out the sources below to learn more (you can also access these links on our SoundCloud page): -Robert Kennedy, “A Rocket Scientist’s Reaction to Independence Day,” The Ultimax Group White Paper, 1996 http://www.ultimax.com/whitepapers/1996_3.html -Kelly Fonda, ““You Want to Blow Up the White House?”: An Oral History of the Film Independence Day, We Minored in Film, April 28, 2015, https://weminoredinfilm.com/2015/04/28/you-want-to-blow-up-the-white-house-an-oral-history-of-the-film-independence-day/ -Janet Burns, “16 Earth-Shattering Facts About ‘Independence Day,’” MentalFloss, July 3, 2016, http://mentalfloss.com/article/76231/16-earth-shattering-facts-about-independence-day -Joe Skrebels, “Independence Day Director Roland Emmerich Mocks Marvel Movies,” IGN, June 28, 2016, http://www.ign.com/articles/2016/06/20/independence-day-director-roland-emmerich-mocks-marvel-movies -ID4 Deleted Scenes, https://www.youtube.com/watch?v=4rf3eB5bFe4 -U.S. Air Force Capt. Robert Salas - UFO's Are Real, https://www.youtube.com/watch?v=zjbhq4P_sZI -Eric Julien, The Iron Skeptic, http://www.theironskeptic.com/articles/julien/julien.htm -Kim Zetter, “An Unprecedented Look at Stuxnet, the World’s First Digital Weapon,” Wired, November 3, 2014, https://www.wired.com/2014/11/countdown-to-zero-day-stuxnet/ -Andrew Futter, “The Dangers of Using Cyberattacks to Counter Nuclear Threats,” Arms Control Today, July/August 2016, https://www.armscontrol.org/ACT/2016_07/Features/The-Dangers-of-Using-Cyberattacks-to-Counter-Nuclear-Threats -“'Independence Day' Producer Finally Explains Infamously Inept Hacking Scene,” Yahoo Movies, December 8, 2014, https://www.yahoo.com/movies/independence-day-producer-explains-hacking-scene-104676447332.html -Jakob Nielson, “Excessive Interoperability in Independence Day,” NN Group, December 18, 2006, https://www.nngroup.com/articles/independence-day-interoperability/ -Russ Wellen, “Alienating Aliens: Do Nukes Make Them Go Ballistic?,” HuffingtonPost, May 25, 2011, http://www.huffingtonpost.com/russ-wellen/alienating-aliens-do-nuke_b_414394.html -Atomic Bomb Test – Survival Towns, https://www.youtube.com/watch?v=tr76hNngqts -Teapot Apple 2 Nuclear Test, https://www.youtube.com/watch?v=ztJXZjIp8OA We aim to have at least one new episode every month. Let us know what you think about the podcast and any ideas you may have about future episodes and guests by reaching out at on Twitter @NuclearPodcast, GooglePlay, SoundCloud, TuneIn, Stitcher Radio, Facebook, SuperCriticalPodcast@gmail.com, and YouTube. Thanks to bensound.com for some of the background music used in this episode. Enjoy!
Paulo Sant’anna recebe pela primeira vez Alan Oliveira, um dos tradutores do livro "Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon" de Kim Zetter. No livro, a jornalista especializada em cibersegurança conta a história por traz do vírus que sabotou os esforços iranianos para criação de um programa nuclear, mostrando como sua criação inaugurou um novo tipo de guerra, em que ataques digitais podem ter o mesmo poder destrutivo de uma bomba atômica. Do que trata o livro? O livro trata do surgimento da primeira arma digital do mundo, o Stuxnet, desde suas origens nos corredores da Casa Branca até a execução do ataque a uma usina atômica no Irã. Sua existência começou a se tornar pública em 2010, após inspetores da Agência Internacional de Energia Atômica (IAEA) perceberem que as centrífugas de uma usina iraniana de enriquecimento de urânio estavam falhando em um ritmo sem precedentes por razões absolutamente desconhecidas. Cinco meses depois - em um evento aparentemente não relacionado -, uma empresa de segurança em Belarus foi chamada para solucionar problemas em computadores no Irã. Nesses computadores eles encontraram um malware que, inicialmente, pensaram se tratar de uma ameaça simples e rotineira; mas análises mostraram se tratar de algo misterioso, e de complexidade sem precedentes. O livro cita em detalhes o trabalho realizado por analistas de segurança da informação e analistas de sistemas de controle industrial (SCADA) para dissecar e desvendar esse malware. Além disso, "Countdown" fala sobre a Guerra Cibernética, seu desenvolvimento e o mercado de compra e venda de códigos maliciosos. Você pode citar outros destaques do livro? Para o ataque do Stuxnet ser bem sucedido, não poderia haver erros. O livro descreve suas etapas de criação com detalhes, desde a contratação de pessoal especializado em centrífugas de usinas nucleares, até a simulação em ambientes com centrífugas iguais às iranianas para que o código fosse lançado em campo com a máxima eficácia. Além disso, nosso entrevistado conta como o livro revela detalhes desconhecidos do grande público sobre o mercado ilegal (ou cinza), obviamente não regulamentado, de vendas de códigos maliciosos para pessoas que agem em defesa da segurança nacional de diversos países. O preço desses códigos (0-day) é variável, dependendo da exclusividade e do programa, podendo chegar até U$ 200.000. Alan finaliza a entrevista contando histórias reais sobre ataques cibernéticos que ocorreram em países como Estônia e Geórgia. Quando o livro será lançado? O lançamento do livro está previsto para novembro deste ano. Alan Oliveira é Engenheiro, mestre em Engenharia Eletrônica na área de sistemas inteligentes. Atuou por 7 anos como oficial da marinha nas áreas de sistemas de armas e comunicações. Atualmente é professor na Marinha do Brasil, onde ministra as disciplinas de controle de sistemas, guerra eletrônica e sistemas de comunicação. Desenvolve em seu doutorado uma pesquisa voltada para a segurança de sistemas de controle e automação.
New America's Peter Singer and Passcode's Sara Sorcher chat with Bruce Schneier, prolific author and chief technology officer at Resilient Systems, about the challenges of publicly blaming countries for cyberattacks – and whose job it should be to defend private companies against sophisticated nation-state attacks. They also hear from Nate Fick, the CEO of Endgame, a venture-backed security intelligence software company, about how he's leveraging cybersecurity solutions once produced just for the government into the private sector. Wired's Kim Zetter, author of Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon, joins the panel discussion to talk about how the cyber operation on Iran's nuclear facilities launched a new era of warfare; the vulnerability of US critical infrastructure to Stuxnet-like weapons; and the gender diversity issues bedeviling the cybersecurity industry.
This week, Tosin and Andy are once more joined by Greg Davies (from TARDISBlend, Blendover, and Heavy Metal Historian podcasts) as we discuss: Gigaom says goodbye, Wikimedia stands up against the NSA, Apple's big Spring event, Marvel's Daredevil comes to Netflix... You know who ya gonna call!! What We're Playing With Andy: MOGG Files, Raspberry Pi 2 (BerryBoot, RetroPie) Tosin: ATH-M50x Headphones, Automation in Japan Greg: Daylight Savings Time Headlines Pioneering tech blog Gigaom shuts down after running out of money Wikimedia files suit against NSA iSpy: The CIA Campaign to Steal Apple's Secrets Audible Book of the Week Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon by Kim Zetter Sign up at AudibleTrial.com/TheDrillDown Music Break: Big Time by Peter Gabriel Hot Topic: Apple's 'Spring Forward' 2015 Event Apple's Big Event: Everything You Need to Know The 9 biggest things from the Apple Watch and MacBook announcement USB Type-C is the biggest news for tech HBO on the Web Is Coming in April, Exclusively From Apple, $14.99/mo; Apple TV $69 markdown Apple Watch includes 8GB of storage, replaceable battery with three year lifespan The Apple Watch Isn't A Watch, It's An iPhone Sales Engine Video: Apple's 'Spring Forward' event summarized in 2 minutes Music Break: Ghostbusters by Ray Parker, Jr. Final Word Sony Developing Second ‘Ghostbusters'; Channing Tatum Might Star, Russo Brothers Could Direct ‘Zoolander 2′: Derek Zoolander and Hansel At Paris Fashion Week The Drill Down Video of the Week Official Trailer For Marvel's 'Daredevil' On Netflix Released Subscribe! The Drill Down on iTunes (Subscribe now!) Add us on Stitcher! The Drill Down on Facebook The Drill Down on Twitter Geeks Of Doom's The Drill Down is a roundtable-style audio podcast where we discuss the most important issues of the week, in tech and on the web and how they affect us all. Hosts are Geeks of Doom contributor Andrew Sorcini (Mr. BabyMan), marketing research analyst Dwayne De Freitas, and Box tech consultant Tosin Onafowokan. Occasionally joining them is Startup Digest CTO Christopher Burnor.