Å·±¦ÓéÀÖ

Jump to ratings and reviews
Rate this book

Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon

Rate this book
In January 2010, inspectors with the International Atomic Energy Agency noticed that centrifuges at a uranium enrichment plant in Iran were failing and being replaced at an unprecedented rate. The cause of their failure was a complete mystery.

Five months later, a seemingly unrelated event occurred. A computer security firm in Belarus was called in to troubleshoot some computers in Iran that were caught in a reboot loop—crashing and rebooting repeatedly. At first, technicians with the firm believed the malicious code they found on the machines was a simple, routine piece of malware. But as they and other experts around the world investigated, they discovered a virus of unparalleled complexity and mysterious provenance and intent. They had, they soon learned, stumbled upon the world’s first digital weapon.

Stuxnet, as it came to be known, was unlike any other virus or worm built before: It was the first attack that reached beyond the computers it targeted to physically destroy the equipment those computers controlled. It was an ingenious attack, jointly engineered by the United States and Israel, that worked exactly as planned, until the rebooting machines gave it all away.

And the discovery of Stuxnet was just the beginning: Once the digital weapon was uncovered and deciphered, it provided clues to other tools lurking in the wild. Soon, security experts found and exposed not one but three highly sophisticated digital spy tools that came from the same labs that created Stuxnet. The discoveries gave the world its first look at the scope and sophistication of nation-state surveillance and warfare in the digital age.

Kim Zetter, a senior reporter at Wired, has covered hackers and computer security since 1999 and is one of the top journalists in the world on this beat. She was among the first reporters to cover Stuxnet after its discovery and has authored many of the most comprehensive articles about it. In COUNTDOWN TO ZERO DAY: Stuxnet and the Launch of the World’s First Digital Weapon, Zetter expands on this work to show how the code was designed and unleashed and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure—power grids, nuclear plants, oil pipelines, dams—is vulnerable to the same kind of attack with potentially devastating results. A sophisticated digital strike on portions of the power grid, for example, could plunge half the U.S. into darkness for weeks or longer, having a domino effect on all other critical infrastructures dependent on electricity.

406 pages, Hardcover

First published June 3, 2014

1,191 people are currently reading
13.6k people want to read

About the author

Kim Zetter

4Ìýbooks75Ìýfollowers

Ratings & Reviews

What do you think?
Rate this book

Friends & Following

Create a free account to discover what your friends think of this book!

Community Reviews

5 stars
3,039 (38%)
4 stars
3,376 (42%)
3 stars
1,254 (15%)
2 stars
174 (2%)
1 star
39 (<1%)
Displaying 1 - 30 of 727 reviews
Profile Image for Christopher Anderson.
471 reviews
November 23, 2014
Pretty good for the first 2/3 of the book. Especially interesting if you work in technology. What hurt the book was the last 1/3 of it - in which the author essentially repeated a few things page after page. It was pointless. I have a flaw that makes it very difficult for me NOT to finish a book, and I paid the price on this one.
Profile Image for Edgarr Alien Pooh.
316 reviews253 followers
April 30, 2021
Countdown to Zero day is an investigation of the Stuxnet computer virus that was launched in 2009 and secondary versions in 2010. Stuxnet (named by Microsoft) is, to this day, one of the only attacks the world has seen using digital technology. This 'weapon' seemingly came from nowhere to attack the uranium processing plants of Iran, plants that were believed to be producing weapons-grade uranium.

The first 75% of the book investigates just what Stuxnet was and how it worked, seeking out the very computers it needed to infect while 'sighting' others and leaving them be. Let's be honest, this virus was brilliant. It affected only what it needed to, it hid for many months, it tricked Microsoft's Autorun feature to seek it out and run it without crashing the system, it shut itself down when it was done or found a machine it did not want and it had a built-in shelf life. Kim Zetter investigates just how the virus was launched and the response to it by the world's superpowers. If the virus was designed to hide, how was it eventually discovered, and have there been any other related attacks?

Stuxnet interrupted work and slowed the uranium production in Iran down considerably but it is far from the virus we are used to on our home computers and office networks. It did not seek to infect and steal information or finances, it did not shut down computers, and it did not affect production by merely slowing the computer network. Stuxnet basically told the plant workers that the plant was failing.

The last 25% of the book traces the culprits of the Stuxnet launch and looks at what this could mean for the future. Will cyber warfare take over from the physical warfare, is the world ready to handle this type of attack, what has Stuxnet shown us, and the answers to many other questions. Countdown to Zero day can become quite technical in some places but Zetter does her best to explain the tech talk as we go along. A bit of a geek read, I suppose, but absolutely fascinating.

Profile Image for Amar Pai.
960 reviews98 followers
March 30, 2015
Honestly, if I were rating the book strictly on its own merits it would only be 3 stars, because it feels like a stretched to book form. But 4 stars is lifetime achievement award, because Zetter has been the best mainstream reporter working on this story (and the security beat in general) for a while now. She really gets the details right, and I'm glad a reporter of her caliber tackled this story. I STILL years later am thinking about Stuxnet. It was, and is, an absolutely mind-blowing turn of affairs.

If you're like me and you already know everything about Flame, Duqu, Stuxnet because you're obsessed with the topic, you can probably give Countdown to Zero Day a miss. But if you don't know what any of those things are, buy this book immediately!
29 reviews4 followers
December 31, 2014
I began reading Countdown to Zero Day thinking it would be a more detailed exploration of the Stuxnet attack against the Iranian uranium enrichment program. That program is a key part of Iran’s nuclear weapons program as it enables Iran to produce bomb grade uranium. Stuxnet was(is) a worm that sought out target computers controlling the Iranian centrifuges and then assumed control of the centrifuges, interfering with the production of uranium hexafluoride gas and causing the destruction of the centrifuges themselves.

While the book does not provide a detailed description of the malware itself it provides so much more that I had been unaware of; the Iranian nuclear program, nukes and uranium processing, watchdog agencies including IAEA and the CIA. It also covers zero day software exploits, the companies that develop them and the consumers of zero day exploits. It also provides insight into the market for malware and exploits and the security industry that tries to stay ahead of malware.

All in all an interesting story and there were plenty of references that allowed me to find much more detailed information about Stuxnet on the web.

I was surprised that it was pretty much accepted that Stuxnet was the work of the US and Israel with the US providing much of the initial technology for weaponized worms. But after reading the book I can’t imagine the attack being produced by anyone else with the possible exception of the Chinese who are without motive.

I was much more surprised� staggered with the descriptions of stolen signing certificates, and attacks on certificate authorities to obtain certificates that allowed Stuxnet to install kernel mode rootkits. Additionally the attackers obtained Microsoft certs by employing sophisticated exploits that utilized MD5 collisions and predicting the time of certificate issuance. Also attacking Microsoft Update! Crazy stuff that attacks the underpinnings of the internet and how users would go about patching Windows.

This book definitely exceeded my expectations and I think everyone interested in the Internet, the use of digital weapons, nuclear weapons and their control and acquisition will find something of interest in it
Profile Image for Will Semin.
17 reviews14 followers
October 7, 2019
For a SOFTWARE engineer of any level, this book has a lot of great ideas to make your code more readable and maintainable. I wish I had DSICOVERED it earlier.
Profile Image for Andrew Obrigewitsch.
951 reviews155 followers
August 9, 2016
NSA Agent Num 1: So you remember that really bad idea for a weapon that nearly destroyed the planet that we came up with in the 1940s?
NSA Agent Num 2: Yeah, what about it?
NSA Agent Num 1: I have an idea just as bad as that one.
NSA Agent Num 2: Wow, what is it, we better get everyone we can on something that wonderful.
NSA Agent Num 1: We should create a virus that will take control of systems in a facility in another country and destroy them, not only will this show hackers all around the world how to do this, but it will spark off a cyber arms race that any country in the world can join in, not just the rich ones, like those with nuclear bombs. And it will be much harder to track down who has these capabilities than Nuclear Bombs.
NSA Agent Num 2: That's incredible, let's talk to president Bush, I hear he's a real smart guy, I know he will approve it instantly.

And thus we have history and the subject of this book.
Profile Image for Alex Givant.
287 reviews37 followers
March 18, 2019
Excellent story about Iran's nuclear project and how USA/Israel sabotaged it by all means (including cyber- and physical-attacks on people involved with the program).
Profile Image for Emre Sevinç.
171 reviews422 followers
February 20, 2022
I remember it like yesterday: watching the news as the mysterious events surrounding Stuxnet unfolded, only to add to the mystery in some aspects. But that was more than 10 years ago!

Then I remember watching "", a jaw dropping documentary.

Finally, I had the opportunity to read this excellent book. Top-notch technical journalism! The author managed to pull of a difficult feat: it's not easy at all to write about such a complex technical subject, in addition to describing the socio-political and historical context surrounding it, and still be able to produce a page-turner.

I'm neither a lay person, nor a cybersecurity expert. But I had my share of software & network security incidents and witnessed first-hand how challenging it can be secure digital systems against countless number of know, and more worryingly, unknown, type of digital attacks.

If you are curious about how far the nation states with almost unlimited financial and human resources can go in order to develop complex software to silently penetrate network and software systems, this book is the perfect starting point.

Oh, by the way, some parts reminded me of , and this should be considered high praise ;)

Profile Image for Tuna.
287 reviews5 followers
September 25, 2014
Best non fiction book of 2014. The entire story of this digital weapon and the aftermath of if it, including the new questions raised going forward was a really compelling tell. By making it read like a really intense mystery narrative it transcended the typically dry fact based story that some books about digital technology find themselves in. One part of me while reading wished that the outcome hadnt already been known and that the US could have been successful in keeping Stuxnet underwraps while continuing to thwart the efforts of rouge states nuclear efforts running haywire. The book was great and all of the footnotes informative and even provocative. Definitely a must read of 2014.
Profile Image for Cliff Mccollum.
98 reviews2 followers
December 5, 2014
I loved the first 4/5's of the book - in which the real story of Stuxnet is told. The last 1/5 is a somewhat tedious timeline of events without much narrative to support it; while interesting, it wasn't nearly as good as the rest of the book. Still, I can easily recommend this if you are interested at all in Cyber-warfare, computer viruses, or the curious relationship between the US and Iran in the first decade of the 21st century.
Profile Image for Roberto Rigolin F Lopes.
363 reviews108 followers
June 28, 2015
Here we have a thrilling plot and a very good storyteller. Zetter goes beyond stuxnet with a vivid narrative of historical, technical and political contexts. The whole thing is entertaining (should also be alarming) because of how the events were knitted together. You may also feel motivated to become an expert in malware analysis. Hoping for peace between Iran and Israel though.
Profile Image for Nick Black.
AuthorÌý2 books865 followers
December 17, 2014
not a great achievement in research or writing or insight or anything, but a pretty competent assembly of timelines and people. feels like it could have been a much more compelling 35-page michael lewis vanity fair article.
Profile Image for Rob.
881 reviews579 followers
July 21, 2019
Executive Summary: A bit longer than I'd have liked, going deeper into history on some things than I was interested in, but the tech stuff was pretty fascinating. 3.5 stars.

Audiobook: For fiction I always want a memorable narrator, but for nonfiction someone forgettable is best. I want the story to speak for itself. I thought Joe Ochman fit the bill nicely for me.

Full Review
I'm always fascinated by computer history, and the story behind Stuxnet is both fascinating and terrifying. Here we are many years later and it doesn't seem like computer security has improved all that much.

It's easy to think that Iran just isn't as advanced as the US, and that's how they were susceptible, but the reality is more about the amount of money spent and probably the fear of retaliation. We may never know the full details of Stuxnet, but this book seems to do a pretty good job of not only attempting to put all the pieces together but fill in the history of the events that led to the attack.

As I read this for technical side, I found my attention drifting at times when she would focus more on the history of Iran and its nuclear program. Overall I'd have liked for it to be a bit shorter, maybe summarizing some of the historical elements more, but still a pretty enjoyable read.
Profile Image for Brian.
658 reviews287 followers
August 18, 2018
(3.5) Started off well (could've been 4 or 4.5), following the researchers uncovering stuxnet's secrets, then covered a lot of side topics and eventually sort of retold the whole story chronologically with repetition and speculation

Lots of research went into this (resulting in some excellent footnotes--to the point that many of them should've just been included in the main text). I enjoyed the investigative aspect, following VirusBlokAda, Symantec, Kaspersky as they teased apart how the worm spread, how it found and attacked its targets, how it deployed its attack and avoided collateral damage, how it evolved as the attackers got both more sophisticated and more aggressive.

There was some good background on other cyberwarfare, on the Iran nuclear program, on nuclear proliferation in general. A lot of this was of some interest, but definitely off topic of stuxnet and in some cases kind of redundant. I'll take the background stuff though as it was informative. Would've loved even more depth on the inner workings of stuxnet and techniques to uncover them, however.

But about 2/3 in, she starts trying to re-tell the whole thing chronologically. It could've been cool as a chronological narrative from the attackers' point of view, even if she had to do a fair amount of speculation at times where there are hazy dates, hazy actors and other unknowns. But instead, there was kind of a dry coverage of what likely happened, with lots of repetition (kept having deja vu with very specific side notes and even nearly duplicate footnotes). Hard to tell the same story twice in one book without running into problems like this. Probably could've left it at the 2/3 point.

Then there's a section looking at the implications of the deployment and detection of stuxnet and what the future of (cyber)warfare will be. It's interesting (she says 'ironic') to note that as the US government started warning itself and its people of our vulnerability to digital attacks, it was engaging in high stakes digital attacks of its own. Probably related, and we seem to be fortunate that we've had several years' time to make headway protecting critical infrastructure. Not sure we've really capitalized on it however, as it's hard to protect against everything everywhere in the face of high costs for unknown cost avoidance.

Still, on the whole, I learned quite a bit, and have a lot of good Kindle Notes & Highlights to show for it. ;)
Profile Image for Doug Cornelius.
AuthorÌý2 books31 followers
December 17, 2014
We were in a cyber war with Iran. Kim Zetter unravels the story of Stuxnet, the US computer attack on Iran's nuclear program in Countdown to Zero Day.

A few months ago, I read urging a US military attack on Iran. That book highlighted how Iran had been building a nuclear program for several years. That included several years of centrifuges spinning to extract enriched uranium.

It has taken so long to extract uranium because, according to Zetter, the United States has been running a sophisticated attack on the computer systems that run those centrifuges. The United States and Israel planted sophisticated tools on those computers designed to alter the speeds of the centrifuges and the flow of gas into and out of them.

We have entered an age where warfare can been broken into digital attacks and kinetic attacks. Computer geeks and fighter jocks can both engage with the enemy. Stuxnet was a replacement for dropping bombs on the enrichment facilities.

Zero day refers to an attack using a previously unknown computer security vulnerability. One attack detailed in Countdown to Zero Day used a "god-mode exploit" that was even more potent. For anyone involved in cybersecurity, the book may make you want to curl up in a ball and hide in the corner.

The book is well-written and well-researched. It's always great to grab a book like this that is enjoyable to read and able to explain complicated situations.

The publisher kindly sent me an advance reader copy of the book in hopes of me writing a review. Countdown to Zero Day goes on sale on November 11.
Profile Image for Colin.
8 reviews3 followers
September 10, 2020
Super interesting read, really gives a good understanding of the technical side of stuxnet as well as how it has/can impact tension and policies between countries.
Profile Image for Matt Neely.
12 reviews
February 6, 2017
Great read on Stuxnet and digital weapons/cyber war. The author did a great job writing a book that is appealing and understandable to non-technical readers while still giving enough details to be of value to someone with in-depth knowledge of cybersecurity. If you want to learn more about these topics this book is a great starting point.
Profile Image for Tucker.
AuthorÌý28 books217 followers
May 29, 2017
This requires more of a technical background than I have. That is not necessarily a shortcoming of the book, but it is hard to have opinions about things I know that I don't know. A couple weeks after finishing it, I wondered: Is it possible I'd just been tired or unfocused? I picked it up again and opened to a random page:
"Falliere used the key embedded in the malware to decrypt the .DLL and found that it contained all of the same functionality as the legitimate Step 7 .DLL. But it also contained some suspicious code that included commands like 'write' and 'read.' Falliere had seen enough malware in his career to know exactly what he was looking at � Stuxnet's Step 7 .DLL was acting as a rootkit, lurking on the system silently, waiting to hijack, or hook, these functions anytime the system attempted to read or write code blocks to or from the targeted PLCs. Similar to the rootkit in the missile portion of Stuxnet, this one was hooking to the read function to hide something that Stuxnet was doing to the PLCs. It was the first time, as far as he knew, that anyone had created a rootkit for an industrial control system." (p. 117)

If you can handle that, this might be a good book for you, all >400 pages of it. Mostly what I got from it is the delightful phrase "radical skunkworks project." I do not know what that means, but it sounds cool.
Profile Image for  Charlie.
477 reviews226 followers
January 10, 2015
Top grade cyber thriller made all the more fascinating by being real. I'm not a techie at all but Zetter has a real gift of turning often complicated and detailed machine/code babble, into something easy and palatable for a reader like myself.

It really is a great story and we get to see the full scope from its beginnings, inception, it's destructive phase and the aftermath. One of the things that was so awesome was the fact that this computer virus actually caused things to physically destroy themselves. It is also Scarey as hell when you consider the implications and how vulnerable we all actually are. In the wake of recent cyber attacks, it hits home even more so. Go get a copy.

I was given a copy of this book by BloggingforBooks in exchange for an honest review.
Profile Image for Ryan.
1,309 reviews184 followers
March 19, 2015
An excellent account of Stuxnet. As a subject matter expert employed in the field, I watched this intently as it unfolded, and was familiar with much of the material in the book, but still found it enjoyable and informative. For anyone who hasn't been following Stuxnet and related issues closely, this book would be an excellent introduction. Even without a technical background, it would be easy to follow the human and political implications.


(Second book I've read this year (audible audiobook, in this case, unabridged))
Profile Image for Drill-sergeant Brown.
7 reviews44 followers
June 16, 2015
The first shot on the bow of any international conflict will probably be some kind of sophisticated cyber attack. This book presents an egaging account of the goings on in the dark web and the dedication of tireless 'security researchers' who spend hundreds of hours making sense of these attacks.
Profile Image for Kit Pang.
37 reviews8 followers
December 24, 2014
A world that I never knew about. Although, the writing is packed with computer/technology terms in the beginning, this book is worth it.

Read on to see where our society is heading...
Profile Image for Ethan.
74 reviews6 followers
November 1, 2019
A thoroughly-researched book that examines the both and cyberwarfare policy individually, as well as their crossroads as it relates to the modern era.

Zetter's descriptions and explanations of all things technical is phenomenal. From the to to , they are simplified enough for the layperson to understand without sacrificing information. Little to no technical background is required to understand the technology discussed, although it certainly doesn't hurt.

The book details the investigation (and obsession) of Stuxnet by a select number of security researchers and firms spread across the world. Zetter describes the researchers' process into dissecting the incredibly complex (I suggest reading through this link, as Symantec was one of those "select number of security researchers and firms") and how they were finally able to understand its final payload.

U.S. cybersecurity and cyberwarfare policy, general cyber "philosophy" (for lack of a better term), and the legality of cyber operations are also discussed. Should zero-day exploits be able to be sold to the highest bidder, whether that be a nation-state or terror group? Do zero-day researchers have an obligation to disclose said exploit to the respective software? How should we respond to zero-day offensives aimed at the U.S? (Hint: depending on the severity of the attack, it may be considered an act of war, and you don't want to be on the wrong side of America when that happens.) Zetter describes what the U.S.' current policy is towards these questions and what discussions are taking place, albeit behind closed doors.

Even if you don't care about the Stuxnet virus or its impact, the cyber aspect of the book is extremely important to understand in this day and age. Our lives are becoming evermore electronically interconnected (phones connect to computers to cars to (wait, what?) to watches), and with it comes vulnerabilities. While those are small-scale connections, compromising large-scale systems has the potential to kill individuals and ravage society: economic markets, power grids, transportation networks, healthcare systems, and computing centers. While there is little ordinary citizens can do to help prevent this, it helps to be informed on issues like this.
Profile Image for Dale Lehman.
AuthorÌý12 books167 followers
March 29, 2019
This is the story of the first and so far only digital weapon to be used. Stuxnet played havoc with centrifuges used by Iran to refine uranium for its nuclear program, a program many feared was intended to produce nuclear weapons. The story is far more complex and convoluted than you may have read in the news, and it raises profound questions about government policy and the future of warfare. Kim Zetter, Wired's award-winning journalism, takes us down the rabbit hole to explore what is known--and what is not--about the development, use, and future of cyberweaponry.

I'm tempted to give this book five stars, but some parts of it may be too heavy for some readers. I don't fault Zetter for this. It's the subject matter. She does a great job of explaining without dumbing down the material, but for all that my wife wasn't able to get past the first couple chapters. So be forewarned, some of it may overtax you. But if you can persist through to the end, you'll be astonished by the revelations and receive a great deal to think about.
Profile Image for Eco.
346 reviews1 follower
November 26, 2024
My end thoughts bring to mind three clichés about this fascinating tale:

1: “the art of the slow reveal�
To ensure that I did not work during lunch, I read this book in 20 minute segments since the beginning of the school year. There were many times I wanted to bring the book home and finish it, but I persevered in using it as my lunch reading.
Now, I need a new book.

2: “I told you so�
While no longer part of the intelligence community, I had an inkling of what might be going on when this all came out in the news. And per chance, even had known some of the engineers.

3: “it’s not paranoia if they’re really out to get you�
COMSEC has always been big with me. As a result, I have been very reluctant to spread an electronic footprint. Unfortunately, some jobs forced me to have a footprint bigger than I like. It’s not being a Luddite, it’s being secure.

I recommend the book to anyone interested in a fascinating recap of history
Profile Image for Sandro.
86 reviews8 followers
August 24, 2018
Thankfully I have found a little non-fiction gem in this book. Recently I have been trying to revitalise my interest for non-fiction books which started out quite badly with another book I dnf'ed. This book, however, read like a crime novel, based on journalistic expertise. At times, I struggled with the abbreviations the author used (one of which is "ISIS" standing for Institute for Science and International Safety, a quite unfortunate choice of abbreviation in hindsight). However, as a whole, the book and its elaborations on the connections between cybercriminiality and warfare is thrilling and immensely relevant.
Profile Image for Tigrlily.
48 reviews
May 22, 2021
Never has the realm of cyber security as covered in this book more relevant than it is today. The recent news of the the Solar Winds hack of US networks for intelligence gathering is just one the latest cyber operation that has been publicized. This book is a chilling account into the world of cybersecurity which spans the years around 2010 when the realm of digital warfare starting rearing its head. It follows the account of the Stuxnet virus, the world’s first affirmed digital weapon designed and used by a nation state for the malicious intent of enemy sabotage and surveillance. Zero day exploits are holes and vulnerabilities unknown to the software maker, that have no anti virus signatures or patches created yet, which can become exploited by hackers for malicious means, giving “zero days" until the exploit is discovered. For context, about 12 million virus and other malicious files are captured on the web each year.

The book details the mysterious and complex worm surreptitiously found on the web, and the global community of anti virus companies that race to decipher the malicious payload to protect internet users. With the collaboration of code engineers around the world, over the course of months and years, digital programmers from Symantec to Kaspersky, work tireless to find the the target of the virus’s payload and why it was created. As the code is unwrapped and decoded, piece by by piece, a world of grey hat hackers, government defense officials and geopolitics start to unfold in their involvement the Stuxnet worm.

The engineers describe Stuxnet as one of the most uniquely and brilliantly designed virus for its time. In addition to being able to attack an industrial system, the virus had self intelligent machine learning; a sunset date, provided intelligence reconnaissance with logging reports, released updates to itself, and searched for previously installed versions of it self on the machines it infected.

The early development of the virus in 2006 coincides with Iran’s nuclear development program, and the country’s subsequent installation and uranium enrichment program in 2007. Eventually, through the book we learn through the anti virus programmers eyes, that the purpose and intent of the Stuxnet virus was a well planned hack with the singular intent to sabotage Iranian nuclear facilities and equipment. Pressure from within the US and Israeli administrations to halt Iran’s nuclear program in 2009 led to covert cyber operation to develop and unleash the virus.

The virus did successfully attack the Iranian nuclear facility causing disruption in the power supply and damaging the centrifuges. Stuxnet was part of defense department’s classified program that used “bytes over bombs�, an attack that avoided conventional military engagement. The book discusses the launch of the digital attack and the creation of US CyberCommand spanning the Bush and Obama Presidency and reveals the future of covert warfare. Ms. Zetter widely references numerous news articles in the book, especially the work of David Sanger of the New York Times who covered the US administration and foreign policy during the time of Stuxnet’s development and release. Zetter also shares her interviews with various US government defense officials about the nations’s cyber policies.

In the light the of Solar Winds digital attack that was just discovered in December 2020, a decade after the release of Stuxnet in the web, we are in a definitive moment where militaries and governments are embracing cyber weapons over the deployment of conventional weapons. In fact, the signatures of the Solar Winds hack in 2020 has many of the same elements of the original prototype of the Stuxnet zero day weapon, called “Flame� which is also detailed in the book.

If Stuxnet shows us what is possible for government sponsored cyber attacks and espionage programs, it should make us take a look at our own domestic infrastructure liabilities prone to be exposed to the same attacks. “The nations most at risk of a destructive digital attack are the ones with with greatest connectivity� says Zetter.

Digital weapons naturally create ongoing criticism and scrutiny about the new rules of international engagement. There is a still a lack of broad public discussion and understanding about the legal repercussions of current US government’s cyber operations which are heavily classified. This story begs the issue : are cyber operations an act of war in the same way conventional military operations engage with hostile nations ? In 2013 international legal experts representing NATO, convened to address the such legalities. The conference resulted in a 300 page document called the Tallinn Manual which draws its framework from the UN’s Charter of “Law of Armed Conflict�.

This book is a primer of the current age of cyber war. It provides clear explanation for technical terms accessible to everyone. As more businesses and organizations come online with digital presences, the more vulnerable they may become in the cyber realm to hackers and state sponsored espionage. And as more nations rely on a digital infrastructure for its power grid, banking, transportation and health systems, the more vulnerable it becomes to a cyber attack. At this time, we can be assured that almost every nation has already started their own arsenal of cyber weapon capabilities in this new age of digital warfare.Countdown to Zero Day, shares what the future may hold for national security and for the public landscape of web.
Profile Image for Isaac.
50 reviews2 followers
January 26, 2021
A truly excellent and terrifying book on a murky and confusing subject. Indeed, the revelations here are near damning in the same way that Snowden's documents are. The journalism and referencing is very good, maybe even excellent. The explanations of coding and logic were good, but could have been more in depth (but I'm biased...I'm a coder). The reasoning for the 4 star rating is that the overall organization of the book could have used another revision. While I do like the looping almost cyclical nature of the style, streamlining it could have made some of the sections more impactful. Still, excellent book and highly recommended!
Displaying 1 - 30 of 727 reviews

Join the discussion

Can't find what you're looking for?

Get help and learn more about the design.