Tuesday, May 03, 2016

Charles Kaiser, The Guardian: Dark Territory review – how WarGames and Reagan shaped US cyberwar battle

Kindly note: I have my personal views on Edward Snowden that may or may not accord with those of Charles Kaiser. However, I kindly suggest you read this interesting and informative review relating to the important topic of Cyberwarfare.

To read the entire item at The Guardian website, kindly click on this link:


Dark Territory review – how WarGames and Reagan shaped US cyberwar battle

From the article:

Ronald Reagan loved movies. One night in June 1983, he sat down at Camp David to watch WarGames. The film stars Matthew Broderick as a tech-wiz teenager who unwittingly hacks into the main computer at Norad, the North American Aerospace Defense Command. Thinking he has merely stumbled upon a new computer game, the hacker comes dangerously close to starting a third world war.

Five days later, the president was in a meeting with the secretaries of state, defense and treasury, the chairman of the joint chiefs of staff and 16 senior members of Congress. They were there to discuss a new nuclear missile and the prospect of arms talks with the Russians. When Reagan began to give a detailed account of the plot of WarGames, eyes rolled.
Then the president turned to John Vessey, the chairman of the joint chiefs, and asked: “Could something like this really happen?”
One week later, General Vessey returned with a startling answer: “Mr President, the problem is much worse than you think.”
Thus begins Dark Territory, Fred Kaplan’s important new book about the history of cyberwar. “When Reagan asked Vessey if someone could really hack into the military’s computers,“ Kaplan writes, “it was far from the first time the question had been asked.”
It turned out that there was a good reason WarGames was so accurate: for their research the screenwriters had interviewed Willis Ware, who wrote a 1967 paper called Security and Privacy on Computer Systems and for years headed the computer science department at the RAND Corporation, an Air Force-funded think tank.
Reagan’s casual inquiry set off the first of many efforts by the intelligence establishment to figure out a way to bolster America’s defensive and offensive cyber capabilities. Each is described in extreme detail in Kaplan’s new book.
Kaplan is the national security columnist for Slate, and he generally does a good job of making even the most technical subjects accessible to the layman. Sometimes the particulars of bureaucratic infighting can be almost numbing, but whenever the narrative threatens to bog down the author manages to revive the reader’s interest.

When Michael Hayden became director of the National Security Agency, he created the Office of Tailored Access Operations (TAO). It created tools resembling “something out of the most exotic James Bond movie”.
These, Kaplan writes, included LoudAuto, which activated a laptop’s microphone to monitor all conversations in its vicinity; HowlerMonkey, which extracted and transmitted files via radio signals even if a computer wasn’t hooked up to the internet; MonkeyCalendar, which tracked a cellphone’s location; NightStand, which could load a computer with malware from several miles away; and RageMaster, which tapped into a computer’s video signal so a TAO technician could see whatever a target was watching.
Congress has been told that China and “probably one or two other countries” are definitely inside the networks that control America’s power grids, waterworks and other critical assets. And though no American official has said so in public, America is also inside the networks “that controlled such assets in other countries”.
“Would burrowing more deeply deter an attack, or would it only tempt both sides, all sides to attack the others’ networks preemptively?” These, Kaplan writes, were the questions that “some tried to answer but no one ever did” during the nuclear confrontations of the cold war.