European Parliament Library

Stuxnet to sunburst, 20 years of digital exploitation and cyber warfare, Andrew Jenkinson

"Stuxnet to Sunburst: 20 Years of Digital Exploitation and Cyberwarfare takes the reader on a journey from the terrorist attacks of 9/11 onwards and the massive insatiable appetite, focus and investment by the Five Eyes agencies, in particular the U.S., to build capability of digital eavesdropping and industrial espionage. With tens of trillions of dollars moving throughout hundreds of thousands of staff,and many contractors draining the country of intelligence and technical capability, the quest was simple and the outcome horrifying. No one in the world has connected the dots, until now. From digital eavesdropping and manipulation of the agencies to Stuxnet, this book covers how the world's first use of digital code and digital certificates for offensive purposes against the Iranians and their nuclear power facilities, caused collateral damage. Proceeding to today's SolarWinds attack, code-named Sunburst, the same methods of exploitation and manipulation originally used by the agencies are now being used against companies and governments with devastating effects. The solarWinds breach has caused knock-on breaches to thousands of client companies including the U.S. government and is estimated to cost more than one trillion dollars. The monster has truly been turned against its creator and due to the lack of security and defence, breaches are occurring daily at an alarming rate. The U.S. and UK governments have little to no answer. Teh book also contains a chapter on breaches within the COVID-19 sector from research to immunisation and the devastating December 2020 breach of SolarWinds. "--, Provided by publisher
Table of contents
Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Foreword -- Preface -- About the Author -- Chapter 1: The Worldwide Explosion of Personal Computers and the Afterthought That Is Security -- Chapter 2: 9/11 and the Creation of Mass Data Collection in the Name of Security... -- Chapter 3: PRISM, Project Aurora, and Early Digital Offensive Capability -- Chapter 4: Stuxnet to Zero Days -- Chapter 5: Hush Puppies, Flying Pigs, Growing Tensions, and Easter Eggs -- Chapter 6: Root Cause Analysis, Aston Martins and Concorde -- Chapter 7: The Office of Personnel Management and Equifax Breaches -- Chapter 8: Marriott and Cyber Insurance: a Fragile Prop -- Chapter 9: From Boom to Bust, or from 3 Billion Floatation to 1 Sale in 18 Months -- Chapter 10: Did Someone Say Critical National Infrastructure and Nuclear Power -- Chapter 11: Cyberattack Fatigue -- Chapter 12: Not Secure, the Vatican and Healthcare -- Chapter 13: Australia's Frustration with China and Assisting the FBI -- Chapter 14: Blackbaud and Third-Party Trust -- Chapter 15: Stuxnet to Sunburst -- Chapter 16: www.avsvmcloud(.)com (SolarWinds Attack) the Modus Operandi for Attacks Since Stuxnet -- Chapter 17: The TAO, Quantum Insert, and Own Goals -- Chapter 18: The COVID-19 Breaches -- Chapter 19: Should We Be Concerned or Worried? Our Government and Agencies Have Got This -- Chapter 20: Making the Matter Far Worse (IoT and 5G) -- Chapter 21: NSA Obsolete TLS Protocols -- Chapter 22: What Does the Future Hold? By Asking Better Questions, We Will Get Better Answers and Take Better Action -- Index
Literary form
non fiction
Includes index
Physical description
1 online resource (198 pages)
Specific material designation
Form of item

Library Locations

  • EP Library Luxembourg

    Rue du Fort Thüngen, Luxembourg, L-1313, LU
  • EP Library Brussels

    60 rue Wiertz, Brussels, B-1047, BE
  • EP Library Strasbourg

    7 Place Adrien Zeller, Allée du Printemps, Strasbourg, F-67070, FR