You’ll learn
- The impact of global security
- Intricacies of state-sponsored hacking
- About global cyber-warfare
- Some major privacy concerns of cyber security
russia has launched a full-scale war in Ukraine. Donate to support Ukraine and protect the world’s peace.

first KEY POINT
Ukraine declared its independence through a referendum from the Soviet Union; however, several speculations point to the involvement of external forces in the country-wide downtime experienced in Ukrainian cities.The attack affected railways, ATMs, gas stations, the postal service, and most notably, radiation monitors at the Chornobyl nuclear site. It all started after Ukraine revolted against Putin’s government in 2014. Viktor Yanukovych, then president of Ukraine, was ousted from office, setting plans in motion to elect a pro-Western leadership. However, the elections would experience widespread glitches and manipulations due to suspected Russian hackers.
No official documents link the Kremlin to hackers waging cyberwar against Ukraine, the U.S., and other global adversaries. Still, the body language of President Putin encouraged these autonomous artists. More interestingly, Putin hailed Russian hackers as patriotic citizens, vowing to employ their services when necessary.Global attacks from China, the U.S., Russia, and North Korea indicate new forms of warfare. And America’s National Intelligence Agency has discovered several potential threats to America’s grids, e-commercial, and digital installations. The U.S.’s concern about global exploitation attacks rose for two reasons: Ukraine has only a fraction of its economy digitized, and Russia was able to bring Kyiv and Ukrainian hubs to a standstill. Imagine the fate of a heavily digital economy like the U.S. if it became a victim of a global reprisal attack.This summary will introduce you to many characters and exciting tales about how various entities struggle to gain and retain control of the Internet. You’ll enjoy an unprecedented unveiling of the Internet and its regular suspects.
second KEY POINT
Feeling burned out from researching and writing cybersecurity stories for the Times, Perlroth took a well-deserved break to Kenya, Africa, where she spent time away from computers.Three weeks into her vacation in the rural parts of the country, she returned to Nairobi, the capital, which had a good network signal, to check her phone for messages. As expected, her device was inundated with messages. Still, one stood out — her editor at the Times asking her to return as soon as possible, as it was urgent.Fast forward, Perlroth’s new task was to collaborate with the Guardian and ProPublica on two articles based on NSA contractor Edward Snowden's revelations.

Continue reading with Headway app
Continue readingfirst KEY POINT
second KEY POINT
third KEY POINT
fourth KEY POINT
fifth KEY POINT