Event
The world's first digital weapon: Stuxnet
In her recent book Countdown to Zero Day Stuxnet and the Launch of the World's First Digital Weapon, Zetter describes how the code that sabotaged Iran’s nuclear program was planned, designed and unleashed, and how its use opened a Pandora’s Box, ushering in an age of digital warfare in which any country’s infrastructure – power grids, nuclear plants, oil pipelines, dams – is vulnerable to the same kind of attack with potentially devastating results.
Moreover, Zetter describes how digital warfare developed in the US, and how the 'grey markets' has become an arena in which intelligence agencies and militaries pay huge sums for the malicious code they need to carry out infiltrations and attacks.
In this seminar, Ms. Zetter will give us a prescient portrait of what is by some described as 'a world at the edge of a new kind of war'.
The event is organized as part of the seminar series Cyber Security Forum.
Kim Zetter is an award-winning investigative journalist and author who covers cybersecurity, cybercrime, cyber warfare, privacy and civil liberties. She has been covering security and the hacking underground since 1999, most currently as a reporter for Wired, where she has been reporting since 2003. Zetter was among the first reporters to cover the sophisticated Stuxnet-attack after its discovery and has authored one of the most comprehensive books, and various articles about the attack.
The seminar will be streamed on YouTube.
See NUPI's Cyber Security programme page for more resources on this topic.
Programme 10.00 - 12.00:
Welcoming words by Karsten Friis, Head of the Research group for Security and Defence (NUPI)
Presentation by Ms. Kim Zetter
Q&A
Speaker
Related publications
How to govern cyber security? The limits of the multi-stakeholder approach and the need to rethink public-private cooperation
Conflict in Cyber Space: Theoretical, strategic and legal perspectives
Adopting a multidisciplinary perspective, this book explores the key challenges associated with the proliferation of cyber capabilities. Over the past two decades, a new man-made domain of conflict has materialized. Alongside armed conflict in the domains of land, sea, air, and space, hostilities between different types of political actors are now taking place in cyberspace. This volume addresses the challenges posed by cyberspace hostility from theoretical, political, strategic and legal perspectives. In doing so, and in contrast to current literature, cyber-security is analysed through a multidimensional lens, as opposed to being treated solely as a military or criminal issues, for example. The individual chapters map out the different scholarly and political positions associated with various key aspects of cyber conflict and seek to answer the following questions: do existing theories provide sufficient answers to the current challenges posed by conflict in cyberspace, and, if not, could alternative approaches be developed?; how do states and non-state actors make use of cyber-weapons when pursuing strategic and political aims?; and, how does the advent of conflict in cyberspace challenge our established legal framework? By asking important strategic questions on the theoretical, strategic, ethical and legal implications and challenges of the proliferation of cyber warfare capabilities, the book seeks to stimulate research into an area that has hitherto been neglected. This book will be of much interest to students of cyber-conflict and cyber-warfare, war and conflict studies, international relations, and security studies.