The Threatened Net: How the Web Became a Perilous Place
()
About this ebook
The defects hackers use often are well-known and ancient in technological terms, surviving only because of an industry-wide penchant for patching over problems rather than replacing the rot – and because Washington largely shrugged. At critical moments in the development of the Internet, some of the country’s smartest minds warned leaders at the Pentagon and in Congress, but were largely ignored.
The consequences now play out across cyberspace every second of every day, as hackers exploit old, poorly protected systems to scam, steal, and spy on a scale never before possible.
Today, hundreds of billions of dollars are spent on computer security and the danger posed by hackers seems to grow worse each year, threatening banks, retailers, government agencies, a Hollywood studio and, experts worry, critical mechanical systems in dams, power plants, and aircraft.
Many have tried to write about the origins of the Internet. But never before has a writer so thoroughly elucidated the history of the security of the Internet—and why basic flaws in its design continue to leave this country wide open to digital threats.
The Washington Post
The Washington Post has built an unparalleled reputation in its coverage of American politics and related topics. The paper’s circulation, prominence, and influence continue to grow.
Read more from The Washington Post
NSA Secrets: Government Spying in the Internet Age Rating: 4 out of 5 stars4/5Uncovering Trump: The Truth Behind Donald Trump's Charitable Giving Rating: 3 out of 5 stars3/5Democracy Inc.: How Members of Congress Have Cashed In On Their Jobs Rating: 5 out of 5 stars5/5Civil War Stories: A 150th Anniversary Collection Rating: 5 out of 5 stars5/5The Original Watergate Stories Rating: 4 out of 5 stars4/5Generation Z: What It's Like to Grow up in the Age of Likes, LOLs and Longing Rating: 4 out of 5 stars4/5America's Best Food Cities Rating: 0 out of 5 stars0 ratingsThe Great Society: 50 Years Later Rating: 0 out of 5 stars0 ratingsHoliday Cookies: 45 of our Best Recipes Rating: 5 out of 5 stars5/5State of Terror: The War Against ISIS Rating: 0 out of 5 stars0 ratingsFight to the Finish: How the Washington Nationals Rallied to Become 2019 World Series Champions Rating: 5 out of 5 stars5/5Obama vs. Romney: The "Take" on Election 2012 Rating: 3 out of 5 stars3/5The Mueller Report Illustrated: The Obstruction Investigation Rating: 0 out of 5 stars0 ratingsObama: The Evolution of a President Rating: 0 out of 5 stars0 ratingsGuns in America Rating: 5 out of 5 stars5/5The Washington Post Pulitzers: Gene Weingarten, Feature Writing Rating: 0 out of 5 stars0 ratingsThe Case Against Cosby: Sex-Assault Allegations Recast Star’s Legacy Rating: 0 out of 5 stars0 ratingsThe Washington Post Pulitzers: Carol Leonnig, National Reporting Rating: 0 out of 5 stars0 ratingsZero Day: The Threat In Cyberspace Rating: 4 out of 5 stars4/5Justice in Indian Country Rating: 5 out of 5 stars5/5International Reporting: The War in Iraq Rating: 0 out of 5 stars0 ratingsThe Hunt for Bin Laden Rating: 3 out of 5 stars3/5Worth the Wait: The Washington Capitals' Memorable Journey to the 2018 Stanley Cup Rating: 0 out of 5 stars0 ratingsThe Evolution of Bruce Jenner Rating: 0 out of 5 stars0 ratingsObama's Legacy Rating: 0 out of 5 stars0 ratingsJustice For None: How the Drug War Broke the Legal System Rating: 0 out of 5 stars0 ratingsKids Around the World Rating: 1 out of 5 stars1/5The 2016 Contenders: Ted Cruz Rating: 0 out of 5 stars0 ratingsThe 2016 Contenders: Chris Christie Rating: 0 out of 5 stars0 ratings
Related to The Threatened Net
Related ebooks
Nation-State Cyber Offensive Capabilities: an in-depth look into a multipolar dimension Rating: 0 out of 5 stars0 ratingsZero Day: The Threat In Cyberspace Rating: 4 out of 5 stars4/5Digital Earth: Cyber threats, privacy and ethics in an age of paranoia Rating: 0 out of 5 stars0 ratingsThe Global Smartphone: Beyond a youth technology Rating: 0 out of 5 stars0 ratingsEncountering Technology: The Tech Evolution I Have Seen Rating: 0 out of 5 stars0 ratingsThe Coming Cyber War: What Executives, the Board, and You Should Know Rating: 0 out of 5 stars0 ratingsStrong Connections: Stories of Resilience from the Far Reaches of the Mobile Phone Revolution Rating: 0 out of 5 stars0 ratingsCombat Ready IT and PIE: Cyber Security for Small Medium Business and Perpetual Improvement Everywhe Rating: 5 out of 5 stars5/5Stay Cyber Safe: What Every CEO Should Know About Cybersecurity Rating: 0 out of 5 stars0 ratingsCybersecurity as a Fishing Game: Developing Cybersecurity in the Form of Fishing Game and What Top Management Should Understand Rating: 0 out of 5 stars0 ratingsMobile Computing: Securing your workforce Rating: 0 out of 5 stars0 ratingsPutin's Kremlin: Epicenter of Global Cyber Warfare Rating: 0 out of 5 stars0 ratingsIt Strategies in the Post-Pandemic Era: Closed Loop Lifecycle Planning© Series Rating: 0 out of 5 stars0 ratingsThreatening Dystopias: The Global Politics of Climate Change Adaptation in Bangladesh Rating: 0 out of 5 stars0 ratingsRussian Cyber Activity Rating: 0 out of 5 stars0 ratingsBelt and Road Initiative: Emerging World Order Rating: 0 out of 5 stars0 ratingsCyberspace and the Era of Persistent Confrontation Rating: 0 out of 5 stars0 ratingsI Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy Rating: 4 out of 5 stars4/5Information Technologies and Economic Development in Latin America Rating: 0 out of 5 stars0 ratingsLessons Learned: Critical Information Infrastructure Protection: How to protect critical information infrastructure Rating: 0 out of 5 stars0 ratingsCybersecurity Awareness A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsCyber Hygiene A Complete Guide - 2021 Edition Rating: 0 out of 5 stars0 ratingsInformation Governance and Security: Protecting and Managing Your Company’s Proprietary Information Rating: 0 out of 5 stars0 ratingsNessus, Snort, and Ethereal Power Tools: Customizing Open Source Security Applications Rating: 0 out of 5 stars0 ratingsCyber War...and Peace: Building Digital Trust Today with History as Our Guide Rating: 0 out of 5 stars0 ratingsCyber Breach Response That Actually Works: Organizational Approach to Managing Residual Risk Rating: 0 out of 5 stars0 ratingsAnatomy of a cyberattack Rating: 0 out of 5 stars0 ratingsTerror Threat: International and Homegrown Terrorists and Their Threat to Canada Rating: 0 out of 5 stars0 ratingsFrom Corporate Security to Commercial Force: A Business Leader’s Guide to Security Economics Rating: 0 out of 5 stars0 ratingsProtecting the People: GIS for Law Enforcement Rating: 0 out of 5 stars0 ratings
Social Science For You
My Secret Garden: Women's Sexual Fantasies Rating: 4 out of 5 stars4/5The Art of Witty Banter: Be Clever, Quick, & Magnetic Rating: 4 out of 5 stars4/5Becoming Cliterate: Why Orgasm Equality Matters--And How to Get It Rating: 4 out of 5 stars4/5King, Warrior, Magician, Lover: Rediscovering the Archetypes of the Mature Masculine Rating: 4 out of 5 stars4/5Verbal Judo, Second Edition: The Gentle Art of Persuasion Rating: 4 out of 5 stars4/5A People's History of the United States Rating: 4 out of 5 stars4/5Fervent: A Woman's Battle Plan to Serious, Specific, and Strategic Prayer Rating: 5 out of 5 stars5/5The Sun Does Shine: How I Found Life and Freedom on Death Row (Oprah's Book Club Selection) Rating: 4 out of 5 stars4/5The Like Switch: An Ex-FBI Agent's Guide to Influencing, Attracting, and Winning People Over Rating: 4 out of 5 stars4/5Ghosts of the Tsunami: Death and Life in Japan's Disaster Zone Rating: 4 out of 5 stars4/5All About Love: New Visions Rating: 4 out of 5 stars4/5Come As You Are: Revised and Updated: The Surprising New Science That Will Transform Your Sex Life Rating: 4 out of 5 stars4/5Dreamland: The True Tale of America's Opiate Epidemic Rating: 4 out of 5 stars4/5100 Amazing Facts About the Negro with Complete Proof Rating: 4 out of 5 stars4/5You're Not Listening: What You're Missing and Why It Matters Rating: 4 out of 5 stars4/5Women Don't Owe You Pretty Rating: 4 out of 5 stars4/5The Human Condition Rating: 4 out of 5 stars4/5Prisoners of Geography: Ten Maps That Explain Everything About the World Rating: 4 out of 5 stars4/5Just Mercy: a story of justice and redemption Rating: 5 out of 5 stars5/5The Denial of Death Rating: 4 out of 5 stars4/5The Song of the Cell: An Exploration of Medicine and the New Human Rating: 4 out of 5 stars4/5Homicide: A Year on the Killing Streets Rating: 4 out of 5 stars4/5
Reviews for The Threatened Net
0 ratings0 reviews
Book preview
The Threatened Net - The Washington Post
Introduction
When talk began a half-century ago about linking computers into a revolutionary new network, few imagined the possibility of a dark side. Designers foresaw the need to protect the network against potential intruders or military threats, but they didn’t expect the Internet’s own users would someday use the network to attack each other. Nor did they expect how popular and essential the Internet would become.
What began as an online community for a few dozen researchers to move information quickly and reliably now is accessible to an estimated 3 billion people who collectively use it to pursue a full range of human motives: good, bad and everything in between. The network itself, meanwhile, has not aged well. The Internet can appear as elegantly designed as a race car, but it’s closer to an assemblage of hacks
or kludges,
short-term fixes that were supposed to be replaced yet never were. They endure because they work, or at least work well enough.
The consequences play out across cyberspace every second of every day, as hackers exploit old, poorly protected systems to scam, steal and spy on a scale never before possible. The Internet’s original design — fast, open and frictionless — is what allows their malicious code to wreak havoc so widely. The flaws they exploit often are well-known and ancient in technological terms, surviving only because of an industry-wide penchant for patching over problems rather than replacing the rot.
A rising waves of viruses, worms and hackers prompted a chorus of warnings in the 1990s as the Internet was exploding in popularity with the arrival of the world wide web. But the federal government had neither the skill nor the will to do anything about it.
And now the vulnerabilities may never be fixed. After hundreds of billions of dollars has been spent on computer security, the threats posed by the Internet seem to grow worse each year. Where hackers once attacked only computers, the penchant for destruction has now lept beyond the virtual realm to threaten banks, retailers, government agencies, a Hollywood studio and, experts worry, critical mechanical systems in dams, power plants and aircraft.
As the number of connected devices explodes — from roughly 2 billion in 2010 to an estimated 25 billion by 2020 — security researchers have repeatedly shown that most online devices can be hacked. Some have begun calling the Internet of Things,
known by the abbreviation IOT, the Internet of Targets.
Widespread hacks on cars and other connected devices are destined to come, experts say, as they already have to nearly everything else online. It’s just a question of when the right hacking skills end up in the hands of people with sufficient motives.
The future looks no safer as a single operating system, Linux, comes to dominate the online world despite serious security issues that could be fixed but haven’t been. Yet again, other priorities — speed, flexibility, ease of use — often win out. Warnings get ignored.
The Post’s Craig Timberg spent a year delving deeply into the story of how the Internet became at once so crucial and so insecure, by speaking to dozens of scientists, industry leaders and skeptics to tease out the unforeseen consequences of decisions made over decades. His reporting, collected together for the first time in this e-book, tells an essential tale about the creation of our new digital world that’s at once thrilling and unexpectedly dangerous — with the most serious perils still waiting to be revealed.
A flaw in the design:
The Internet’s founders saw its promise but didn’t foresee users attacking one another
By Craig Timberg
May 30, 2015
David D. Clark, an MIT scientist whose air of genial wisdom earned him the nickname Albus Dumbledore,
can remember exactly when he grasped the Internet’s dark side. He was presiding over a meeting of network engineers when news broke that a dangerous computer worm — the first to spread widely — was slithering across the wires.
One of the engineers, working for a leading computer company, piped up with a claim of responsibility for the security flaw that the worm was exploiting. Damn,
he said. I thought I had fixed that bug.
But as the attack raged in November 1988, crashing thousands of machines and causing millions of dollars in damage, it became clear that the failure went beyond a single man. The worm was using the Internet’s essential nature — fast, open and frictionless — to deliver malicious code along computer lines designed to carry harmless files or e-mails.
Decades later, after hundreds of billions of dollars spent on computer security, the threat posed by the Internet seems to grow worse each year. Where hackers once attacked only computers, the penchant for destruction has now leapt beyond the virtual realm to threaten banks, retailers, government agencies, a Hollywood studio and, experts worry, critical mechanical systems in dams, power plants and aircraft.
These developments, though perhaps inevitable in hindsight, have shocked many of those whose work brought the network to life, they now say. Even as scientists spent years developing the Internet, few imagined how popular and essential it would become. Fewer still imagined that eventually it would be available for almost anybody to use, or to misuse.
It’s not that we didn’t think about security,
Clark recalled. We knew that there were untrustworthy people out there, and we thought we could exclude them.
How wrong they were. What began as an online community for a few dozen researchers now is accessible to an estimated 3 billion people. That’s roughly the population of the entire planet in the early 1960s, when talk began of building a revolutionary new computer network.
Those who helped design this network over subsequent decades focused on the technical challenges of moving information quickly and reliably. When they thought about security, they foresaw the need to protect the network against potential intruders or military threats, but they didn’t anticipate that the Internet’s own users would someday use the network to attack one another.
1-1_ComputerWormComputer worm: A standalone piece of software that can make copies of itself and spread to other computers. A destructive worm can make so many copies of itself that it overwhelms host computers, causing them to crash.
We didn’t focus on how you could wreck this system intentionally,
said Vinton G. Cerf, a dapper, ebullient Google vice president who in the 1970s and ’80s designed key building blocks of the Internet. You could argue with hindsight that we should have, but getting this thing to work at all was non-trivial.
Those involved from the early days — what might be called the network’s founding generation — bristle at the notion that they somehow could have prevented today’s insecurity, as if road designers are responsible for highway robbery or urban planners for muggings. These pioneers often say that online crime and aggression are the inevitable manifestation of basic human failings, beyond easy technological solutions.
I believe that we don’t know how to solve these problems today, so the idea that we could have solved them 30, 40 years ago is silly,
said David H. Crocker, who started working on computer networking in the early 1970s and helped develop modern e-mail systems.
Yet 1988’s attack by the Morris Worm
— named for Robert T. Morris, the Cornell University graduate student who created it — was a wake-up call for the Internet’s architects, who had done their original work in an era before smartphones, before cybercafes, before even the widespread adoption of the personal computer. The attack sparked both rage that a member of their community would harm the Internet and alarm that the network was so vulnerable to misdeeds by an insider.
When NBC’s Today
aired an urgent report on the worm’s rampage, it became clear that the Internet