Cyber Attack by Martin Gitlin and Margaret J. Goldstein

Well, I certainly know a lot more about cyber crime and computer security and hacking than I did before I read this young adult nonfiction treatment of the history and current state of cyber attacks on the information we keep in our computer networks, thumb drives, hard drives, cell phones and and other internet connected devices. I also don’t feel nearly as safe as I did before I read about worms and viruses and bots and phishing and ransomware and Blackshades and lots of other nasty cyber-stuff.

Cyber Attack provides students and computer innocents (like me) with a basic introduction to the state of the internet, security-wise. Anyone with an interest in the subjects of cyber crime and cyber warfare is going to want to go deeper, and a bibliography in the back of the book provides readers with several avenues for exploration. I was freaked out enough by the information in the 72 pages of this little book to want to go off-grid for the duration.

Did you know that the computer software called Blackshades, which can take over the camera in your personal computer and take pictures of you in your own home, is a reality, not a myth? According to the author, “one Dutch teenager used his copy of Blackshades to take secret pictures of women and girls on about two thousand computers.”

Did you know that the U.S. has been involved in a secretive cyber war with Iran, trying to shut down or damage their nuclear facilities and capabilities, since 2008? And it’s probably still going on.

Did you know that the Russian and Chinese governments are actively engaged in cyber spying and attacks on U.S. companies and government computer networks, trying to get information about our economic secrets as well as military and other governmental information? And they’ve been quite successful in stealing quite a bit of information that has been of use in business negotiations and could be useful in the future if we ever do have a military confrontation with either country.

Did you know that the entire nation of Estonia–government services, banks, media outlets and other computer networks—came under cyber attack in 2007 from hackers located inside Russia? And even when the hackers were identified, Russia refused to arrest them or do anything to restrain or punish them.

Maybe you knew a lot of this stuff and more that’s in the book, but I didn’t. Again, Mr. Gitlin’s little book is a good introduction to the subject of cyber attacks. And how can a simple little old woman keep her herself and her information secure? Well, says the book, “You could cancel your Internet service, ditch your cell phone, close your bank account, throw away your debit card, and turn off your electricity. You could quit school and never take a job, vote in an election, get a driver’s license, or fly on an airplane. Of course, such a solution is completely unrealistic.”

Of course, the information in this book, published in 2015, is already incomplete and out-dated, to some extent. There’s a publisher’s note in the front of the book:

“This book is as current as possible at the time of publication. However events change rapidly and hacks, big and small, occur on a daily basis. To stay abreast of the latest developments related to hacking, check the New York Times and other major national newspapers for current, up-to-date information.”

Here are a couple of hacking-related news items that were not included in the book because they just happened in 2015:

Hillary Clinton, our Secretary of State, kept her emails on a privateserver located in some part of her house. (Hackers’ goldmine!) She says her information was secure, but no one really knows. “Was her server hacked? We don’t know. Private servers are considered more difficult to protect, in general, than the ones big e-mail hosts like Google use.” (Everything we know about the Hillary Clinton emails, September 15, 2015)

A hackers’ group calling themselves The Impact Team stole and published the private information for millions of users of the website Ashley Madison, a portal for people (mostly men) who wanted to commit adultery. Reporters and cyber security insiders keep saying that if it could happen to Ashley Madison, it could happen to any company on the web. So just know that your financial and personal information is not really safe anywhere on the web.

And the cyber attacks go on.