{"id":2411,"date":"2014-09-23T10:58:47","date_gmt":"2014-09-23T14:58:47","guid":{"rendered":"https:\/\/web.uri.edu\/hc\/?p=2411"},"modified":"2020-02-21T16:25:18","modified_gmt":"2020-02-21T21:25:18","slug":"kim-zetter","status":"publish","type":"post","link":"https:\/\/web.uri.edu\/hc\/2014-event\/kim-zetter\/","title":{"rendered":"Kim Zetter"},"content":{"rendered":"<p><em>Stuxnet and the Launch of the World&#8217;s First Digital Weapon<\/em><\/p>\n<p><strong>Kim Zetter<\/strong> is an award winning journalist and author who covers cybersecurity, cybercrime, cyber warfare, privacy and civil liberties. Since 2003 she has been a staff reporter for <em>Wired<\/em>. Zettter was a finalist for an Investigative Reporters and Editors award in 2005 for a series of articles she wrote about the security problems with electronic voting machines and the controversial companies that make them. In 2006 she broke a story for <em>Salon<\/em> about a secret NSA room at an AT&amp;T facility in Missouri that was believed to be siphoning internet data from the telecom\u2019s network operations center. She wrote a groundbreaking three-part story for <em>Wired<\/em> in 2007 on the cybercriminal underground, which exposed the world of online carding markets and the players behind them. In 2010, she and a <em>Wired<\/em> colleague broke the story about the arrest of Bradley Manning, the former Army intelligence analyst accused of leaking millions of classified U.S. government documents to WikiLeaks. In 2011, she wrote an extensive feature about Stuxnet, a sophisticated digital weapon that was launched by the U.S. and Israel to sabotage Iran\u2019s uranium enrichment program. It was the first virus-worm found in the wild that was designed to cause physical destruction, rather than simply steal data.<\/p>\n<p>Zetter will be speaking about her upcoming book, <em>Countdown to Zero Day<\/em>, which tells the story of Stuxnet and the consequences it has brought.<\/p>\n<p><strong>About this Lecture<\/strong><\/p>\n<p>In June 2010, a small security firm in Belarus discovered a computer worm that infected computers in Iran and caused them to crash. The worm used an ingenious zero-day exploit to spread, but other than this it appeared to be generic malware designed for corporate espionage. But as digital detectives dug through the code and began to reverse-engineer its commands, they soon discovered it was much more sophisticated than previously believed and had a much more insidious goal\u2014 to physically sabotage equipment used in Iran&#8217;s nuclear program.<\/p>\n<p><em>Stuxnet,<\/em> as the malicious program was dubbed, was a landmark attack since it was the first cyberweapon ever discovered in the wild and was the first case of digital code being used for physical destruction. This presentation focuses on how Stuxnet was designed and unleashed on computers in Iran, what made it so unique and sophisticated and why critical infrastructure systems in the U.S. and elsewhere are now at risk of \u2018blowback\u2019 and copycat attacks thanks to the authors of Stuxnet.<\/p>\n<p style=\"text-align: left\"><strong>Helpful Links<br \/>\n<\/strong><\/p>\n<p><a href=\"http:\/\/www.wired.com\/2011\/07\/how-digital-detectives-deciphered-stuxnet\/all\/\" target=\"_blank\" rel=\"noopener noreferrer\">How Digital Detectives Deciphered Stuxnet<\/a><br \/>\n<em>Zetter&#8217;s in-depth article on the Stuxnet virus in <\/em>Wired<br \/>\n11 July 2011<\/p>\n<p><a href=\"http:\/\/www.cbsnews.com\/news\/stuxnet-computer-worm-opens-new-era-of-warfare-04-06-2012\/\" target=\"_blank\" rel=\"noopener noreferrer\">Stuxnet Computer Worm<\/a><br \/>\n<em>An overview of Stuxnet presented on <\/em>CBS 60 Minutes<br \/>\n04 June 2011<\/p>\n<p><a href=\"http:\/\/video.pbs.org\/video\/1939947162\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cracking the Code<\/a><br \/>\nPBS Need to Know <em>report on Stuxnet<\/em><br \/>\n20 May 2011<\/p>\n","protected":false},"excerpt":{"rendered":"<p><em>Stuxnet and the Launch of the World&#8217;s First Digital Weapon<\/em><\/p>\n","protected":false},"author":691,"featured_media":2441,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[8],"tags":[],"class_list":["post-2411","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-2014-event"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/posts\/2411","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/users\/691"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/comments?post=2411"}],"version-history":[{"count":1,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/posts\/2411\/revisions"}],"predecessor-version":[{"id":6063,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/posts\/2411\/revisions\/6063"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/media\/2441"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/media?parent=2411"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/categories?post=2411"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/web.uri.edu\/hc\/wp-json\/wp\/v2\/tags?post=2411"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}