• Пожаловаться

Malcolm Nance: The Plot to Hack America

Здесь есть возможность читать онлайн «Malcolm Nance: The Plot to Hack America» весь текст электронной книги совершенно бесплатно (целиком полную версию). В некоторых случаях присутствует краткое содержание. Город: New York, год выпуска: 2016, ISBN: 978-1-510-72332-0, издательство: Skyhorse Publishing, категория: Политика / Публицистика / на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале. Библиотека «Либ Кат» — LibCat.ru создана для любителей полистать хорошую книжку и предлагает широкий выбор жанров:

любовные романы фантастика и фэнтези приключения детективы и триллеры эротика документальные научные юмористические анекдоты о бизнесе проза детские сказки о религиии новинки православные старинные про компьютеры программирование на английском домоводство поэзия

Выбрав категорию по душе Вы сможете найти действительно стоящие книги и насладиться погружением в мир воображения, прочувствовать переживания героев или узнать для себя что-то новое, совершить внутреннее открытие. Подробная информация для ознакомления по текущему запросу представлена ниже:

Malcolm Nance The Plot to Hack America

The Plot to Hack America: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «The Plot to Hack America»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

In April 2016, computer technicians at the Democratic National Committee discovered that someone had accessed the organization’s computer servers and conducted a theft that is best described as Watergate 2.0. In the weeks that followed, the nation’s top computer security experts discovered that the cyber thieves had helped themselves to everything: sensitive documents, emails, donor information, even voice mails. Soon after, the remainder of the Democratic Party machine, the congressional campaign, the Clinton campaign, and their friends and allies in the media were also hacked. Credit cards numbers, phone numbers, and contacts were stolen. In short order, the FBI found that more than twenty-five state election offices had their voter registration systems probed or attacked by the same hackers. Western intelligence agencies tracked the hack to Russian spy agencies and dubbed them the CYBER BEARS. The media was soon flooded with the stolen information channeled through Julian Assange, the founder of WikiLeaks. It was a massive attack on America but the Russian hacks appeared to have a singular goal—elect Donald J. Trump as president of the United States. New York Times The Plot to Hack America Praise for Malcolm Nance’s bestselling : ON RUSSIAN HACKING RUSSIA’S RESPONSE “I really think the [2016 Presidential] candidates ought to read this…. You should buy this book.” —RACHEL MADDOW, The Rachel Maddow Show, MSNBC “A comprehensive, authoritative, and detailed compendium on the Islamic State (ISIS).” — “In his detailed and informed study Nance argues that, in effect, America’s War on Terror created a new breed of vicious terrorists who wear the mask of Islam like actors in a Kabuki theatre while carrying out horrifically un-Islamic acts.” —RICHARD ENGEL, Chief Foreign Correspondent, NBC News, from his foreword “Putin and the leaders throughout the world have no respect for our country anymore and they certainly have no respect for our leader.” —DONALD TRUMP, Republican presidential candidate and president of the Trump Organization “We know that Russian intelligence services hacked into the DNC and we know that they arranged for a lot of those emails to be released…. But I think laying out the facts raises serious issues about Russian interference in our elections, in our democracy.” —HILLARY CLINTON, Democratic presidential candidate and former Secretary of State “What we do know is that the Russians hack our systems. Not just government systems, but private systems.” —PRESIDENT BARACK OBAMA “As an American double agent who worked against Russian intelligence in the US, this book shows how Putin’s spies stop at nothing.” —NAVEED JAMALI, former double agent and author of “I wouldn’t know anything about it. You know, there are so many hackers today and they work with such finesse, planting a trail where and when they need…. It’s difficult to trace, if even possible…. The important thing here is what the public was shown…. One shouldn’t draw the public attention from the core of the issue by replacing it with secondary details like who did it.” —VLADIMIR PUTIN “Overall, we still see attempts to use—manically use—the Russian issue during the US electoral campaign…. The absurd claims were immediately refuted directly by a presidential candidate’s family.” —DMITRY PESKOV, Russian government spokesman

Malcolm Nance: другие книги автора


Кто написал The Plot to Hack America? Узнайте фамилию, как зовут автора книги и список всех его произведений по сериям.

The Plot to Hack America — читать онлайн бесплатно полную книгу (весь текст) целиком

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «The Plot to Hack America», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема

Шрифт:

Сбросить

Интервал:

Закладка:

Сделать

1

WATERGATE 2.0

THE CENTRAL ORGANIZATIONAL HUB FOR THE Democratic Party is situated in a sand-colored modern building on Canal Street in Southeast Washington DC, just a few blocks away from the Capitol. In late April, 2016 the information technology division of the Democratic National Committee found problems in their system that indicated unauthorized access.

Upon discovery they called in CrowdStrike, an IT security company, to assess the damage. The hope was that it would be minor. Nuisance hackers attack with regularity, protesting various personal and political ideas and quack theories that usually involve the DNC and the Bilderbergs, the faking of the 9/11 attacks, or attempts to deny service in misguided attempts assist the opposition Republicans.

After CrowdStrike technicians implanted analytical software into the structure of the DNC’s servers, they soon discovered that two unknown entities had made an unauthorized penetration of the committee’s computers. The technicians immediately recognized that this was not a nuisance attack; it was a professional hit using professional tools and software. The CrowdStrike team started a series of analytical tests to discover the methods of entry and to outline the pathways that the hackers took into the server system. The tests would allow the cyber sleuths to determine where the hackers went, what they did while inside, and what data they may have taken. Another team checked the DNC’s server logs to see what the hackers had manipulated out of parameter. All of the parameters of the hack would take weeks to lay out in an official report, but it was almost immediately clear that this was not the work of amateur hackers.

Once inside, the two unauthorized users had started rooting around. One entity had implanted itself and had been monitoring the emails and chats of the Democratic staff for months, stealing files, emails, and voice messages—almost everything. The second entity, seemingly operating independently, had targeted two very specific files.

The treasure in political espionage is to know precisely what your enemy knows about you. Every intelligence agency seeks to find the details of the inner management of their opposition, but finding the file summary of what they actually know, what they don’t know and—equally important— what they know that they don’t know , is intelligence gold. For the political season of 2016, the most highly-prized information in the DNC’s servers would be the opposition files held by the Democratic Party about the seventeen Republican Party’s candidates.

The CrowdStrike damage control team determined that the penetration operation conducted by the unknown hackers had left the servers of the Democratic Party severely compromised. They had copied or taken materials of all kinds, and had infiltrated virtually everything of value to a political opponent: personal file folders, official chat threads, digital voicemails, and the email content of virtually everyone’s mailbox. The hackers also obtained the DNC’s donors lists, and it is likely that the donors’ credit card information was associated with these lists. One of the more fascinating aspects about this attack is that it was bold and brazen; many cyber security experts are a little surprised at how the hackers didn’t cover their tracks deeply, as if they wanted to be discovered. There was just enough cover to be deniable, but as one expert observed, it was a “big cyber F-you.” It was an electronic equivalent of a looting where the perpetrators throw everything around on the floor just to let you know they were there.

CrowdStrike quickly determined that the penetration into the servers started in the summer of 2015. Hand in hand with the successful penetration the next year, it would appear that the older attempt was an exploratory operation to determine the security settings on the server’s network. This probe would lay the groundwork for the determined and focused 2016 attack. However one factor was unshakable; the timeline of the 2016 hacks on the computers of the Democratic National Committee clearly indicated that the collection and dissemination was timed to benefit only the opposition Republican Party. Worse, if the hack was truly malicious, even relatively innocent information such as personal discussions, preferences, and the rivalry or relationships among co-workers could be twisted and injected into the national conversation in the months leading up to the election. This was not lost on the Chairperson of the DNC, Debbie Wasserman Schultz. She knew that scandal or not, the Republicans would use the hacked information to attack.

The Republican Party has shown an uncanny proclivity for taking an innocuous subject and by dint of repetition, inference, and outright false accusation make a seemingly innocent remark turn into years of acrimonious investigations. When Democratic staffers removed the letter “W” from a couple of Old Executive Office building computer keyboards, the Republicans turned it into a national campaign about how the White house itself was horribly vandalized by hordes of Democrats. When the staff at the White House travel office was routinely replaced upon the arrival of the freshly sworn-in President Bill Clinton, the scandal machine turned it into a witch hunt of national proportions that led to congressional investigations over abuse of power and personally targeted the First Lady. It’s been joked that had George Washington confessed to cutting down the cherry tree in the modern era, he would have been investigated for destruction of government property and abuse of authority, and promptly impeached.

However, this hack was unprecedented. The exposure of all of the internal discussions on the processes, procedures, strategy, beliefs, and thoughts of every staffer at the DNC from Debbie Wasserman Schultz down to the concerned citizen who calls and leaves a voice mail, was staggering. Any innocent comment could be turned into a political flamethrower. All discussions could be framed as conspiracies. The question at hand for the DNC became not who conducted the hack, but what would they do with the information.

Watergate 1.0

In 1972, President Richard Nixon, through his proxies in the White House called “The Plumbers” and in coordination with the Committee to Reelect the President (aka CREEP), sent five men into the offices of the Democratic National Committee in the offices at the luxurious Watergate hotel in Washington DC. The burglars had orders to install wiretaps, break into safes, and copy files to find out exactly what opposition research the Democrats had on Nixon in the months before the election. Although he won the presidential election, by August of 1973, the political scandal of covering up the crime led to Nixon being the first President to resign in disgrace.

The 2016 DNC hack conducted forty-four years later—almost to the day—was the exact same operation. However, this time there would be no security guard to detect the intrusion, and the burglars would not be caught wearing latex gloves and planting microphones. They would copy the information in a matter of seconds, their digital fingerprints would emerge long after the break-in, and discovery would occur well after the damage had been done to Hillary Clinton’s presidential campaign.

There were a myriad of suspects on the political stage from Trump supporters to Black Hat members of Anonymous, the shadowy hacker collective that sought to expose hidden secrets though public sun lighting. Though the DNC is a political machine that managed the Democratic Party and the campaigns of its members to office, it also operates as the framework to express the political aspirations of a huge proportion of the American electorate.

When President Barack Obama won re-election to the Presidency in 2012, he won over 65 million votes representing 51.1 percent of American voters. The management team for that electoral success was the DNC. They not only represent the candidates, but once the candidates are selected the DNC is the principle agency for the grooming, funding, and support to meet the goals of the party. Now, all of their internal secrets were stolen.

Читать дальше
Тёмная тема

Шрифт:

Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «The Plot to Hack America»

Представляем Вашему вниманию похожие книги на «The Plot to Hack America» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё не прочитанные произведения.


Vince Flynn: Act of Treason
Act of Treason
Vince Flynn
libcat.ru: книга без обложки
libcat.ru: книга без обложки
Roger Ellis
Oliver Stone: The Putin Interviews
The Putin Interviews
Oliver Stone
Richard Lourie: Putin
Putin
Richard Lourie
Hillary Clinton: What Happened
What Happened
Hillary Clinton
Отзывы о книге «The Plot to Hack America»

Обсуждение, отзывы о книге «The Plot to Hack America» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.