{"id":8624,"date":"2020-11-03T07:00:00","date_gmt":"2020-11-03T12:00:00","guid":{"rendered":"https:\/\/vweisfeld.com\/?p=8624"},"modified":"2020-12-07T09:23:12","modified_gmt":"2020-12-07T14:23:12","slug":"the-perfect-weapon","status":"publish","type":"post","link":"https:\/\/vweisfeld.com\/?p=8624","title":{"rendered":"The Perfect Weapon"},"content":{"rendered":"\n<div class=\"wp-block-image\"><figure class=\"alignleft size-large is-resized\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2020\/11\/Perfect-Weapon.jpg?resize=291%2C217&#038;ssl=1\" alt=\"The Perfect Weapon, HBO, David Sanger\" class=\"wp-image-8625\" width=\"291\" height=\"217\" srcset=\"https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2020\/11\/Perfect-Weapon.jpg?w=259&amp;ssl=1 259w, https:\/\/i0.wp.com\/vweisfeld.com\/wp-content\/uploads\/2020\/11\/Perfect-Weapon.jpg?resize=150%2C112&amp;ssl=1 150w\" sizes=\"auto, (max-width: 291px) 100vw, 291px\" \/><\/figure><\/div>\n\n\n\n<p>In mid-October, HBO released its documentary, <a href=\"https:\/\/www.hbo.com\/documentaries\/the-perfect-weapon\"><em>The Perfect Weapon<\/em><\/a>, about growing cyber security risks (<a href=\"https:\/\/www.youtube.com\/watch?v=t4H6sjMis_s\">trailer<\/a>). A recent <a href=\"https:\/\/www.thecipherbrief.com\/\">Cipher Brief<\/a> webinar featured David Sanger, national security correspondent for <em>The New York<\/em> <em>Times, <\/em>who wrote the book on which the documentary was based, and Mary Brooks, who contributed to both his book and the documentary, and was moderated by Cipher Brief founder Suzanne Kelly.<\/p>\n\n\n\n<p>Creating a documentary based on a detailed, fascinating, and chilling 340-page book is a challenge. It had to be more interesting than 000s and 111s scrolling down the screen. There was a history to lay out. Director John Maggio decided to render the technology aspects of earlier cyberattacks in broad strokes and to humanize the story by focusing on the victims. This approach not only revealed how many sectors of society are vulnerable to cyber criminals, but also how diverse are the sources of these attacks.<\/p>\n\n\n\n<p>The first cyber attack receiving much play in the United States was North Korea\u2019s 2014 takedown of Sony in response to a movie it didn\u2019t like. For that segment, Maggio\u2019s team could interview actors and executives. It was harder to get the story of the next significant attack\u2014this one by the Iranians on the Sands Casino in Las Vegas\u2014because the casino executives don\u2019t want to publicize it.<\/p>\n\n\n\n<p>Since then, attacks have continued, most recently with <a href=\"https:\/\/www.wired.com\/story\/ransomware-hospitals-ryuk-trickbot\/\">ransomware attacks on US hospitals<\/a> already stretched thin by the coronavirus, and on <a href=\"https:\/\/statescoop.com\/florida-ransomware-public-sector\/\">local governments in Florida<\/a>, for example\u2014after crippling attacks on <a href=\"https:\/\/www.secureworldexpo.com\/industry-news\/baltimore-ransomware-attack-2019\">Baltimore<\/a> and <a href=\"https:\/\/www.wired.com\/story\/atlanta-spent-26m-recover-from-ransomware-scare\/\">Atlanta<\/a>.<\/p>\n\n\n\n<p>Though costly and significant, these episodes have not been serious enough to trigger retribution by the US government. \u201cThey are short of war operations,\u201d Sanger said, \u201cand deliberately calculated to be so.\u201d The potential for much more consequential acts definitely exists. It is known, for example, that malware has been placed in the US power grid, where it sits. Officials don\u2019t want to talk about it, or remove it, ironically, because they don\u2019t want the bad actors to understand our detection capabilities.<\/p>\n\n\n\n<p>Of course, the United States isn\u2019t inactive in this arena. In 2010, our government. and Israel used the malicious computer worm Stuxnet to disable Iran\u2019s nuclear program, an action US officials won\u2019t admit to even now, Sanger said. Unfortunately, the destructive Stuxnet code escaped into the wild and is now available to many black-hat hackers. Stuxnet \u201cdidn\u2019t start the fire,\u201d he said, \u201cbut it was an accelerant.\u201d<\/p>\n\n\n\n<p>Who is behind an attack can be murky. For various reason, organized crime has increasingly muscled its way into the cyber-threat business. Governments hire hackers or external organizations to create havoc, because it gives them deniability. \u201cNot us,\u201d they say.<\/p>\n\n\n\n<p>The <a href=\"https:\/\/www.cybercom.mil\/About\/\">US Cyber Command<\/a>\u2019s goal is to \u201cdefend and advance national interests.\u201d However, the job of preventing attacks is difficult. It\u2019s a challenge that requires considerable imagination, given an environment where the risks are escalating rapidly, the technology is improving constantly, and the targets have no boundaries. You may have read about recent threats to <a href=\"https:\/\/www.bbc.com\/news\/technology-53429506\">COVID vaccine research<\/a>.<\/p>\n\n\n\n<p>What exactly are the \u201cnational interests,\u201d when American businesses have suppliers, clients, and customers all over the world? Companies don\u2019t want to be perceived as working against those relationships. Google, for example, declined to participate in a military program to make drone attacks more accurate. Similarly, though <a href=\"https:\/\/www.nytimes.com\/2020\/10\/12\/us\/politics\/election-hacking-microsoft.html\">Microsoft and the Cyber Command<\/a> were both attempting to disable TrickBot in the last few weeks, their efforts were independent and uncoordinated.<\/p>\n\n\n\n<p><em>Thomas Donahue, Senior Analyst at the Center for Cyber Intelligence has said,<\/em> \u201cWe cannot afford to protect everything to the maximum degree, so we\u2019d better figure out what cannot fail,\u201d<\/p>\n\n\n\n<p>The documentary\u2014<a href=\"https:\/\/amzn.to\/322emXn\">and the book<\/a>\u2014lay out what\u2019s at stake for all of us. Past posts on this topic:<br>* <a href=\"http:\/\/www.vweisfeld.com\/?p=7655\">Our Biggest Threats Keep Growing<\/a><br>* <a href=\"http:\/\/www.vweisfeld.com\/?p=7739\">Cyberthreats: Coming to a Company Near You<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In mid-October, HBO released its documentary, The Perfect Weapon, about growing cyber security risks (trailer). A recent Cipher Brief webinar featured David Sanger, national security correspondent for The New York Times, who wrote the book on which the documentary was &hellip; <a href=\"https:\/\/vweisfeld.com\/?p=8624\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"The Perfect Weapon -To distract you from election results, here are even more dire possible scenarios. HBOs documentary based on a vital review of cyber-threats.","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[62,52,58,193,267,268,35,186,104],"tags":[1746,1768,1770],"class_list":["post-8624","post","type-post","status-publish","format-standard","hentry","category-authors","category-crime","category-documentaries","category-espionage","category-non-fiction","category-politics","category-real-life","category-technology","category-the-morgue","tag-cipher-brief","tag-david-sanger","tag-suzanne-kelly"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p2NkiT-2f6","_links":{"self":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/8624","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=8624"}],"version-history":[{"count":1,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/8624\/revisions"}],"predecessor-version":[{"id":8626,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=\/wp\/v2\/posts\/8624\/revisions\/8626"}],"wp:attachment":[{"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=8624"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=8624"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vweisfeld.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=8624"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}