Segments in this Video

Digital Weapon (02:17)

FREE PREVIEW

In the modern age, a computer hacker can inflict serious damage on a company. Hacking can be used for good or nefarious purposes. (Credits)

Potential for Massive Power Outages (03:05)

Frank Boldewin came across Stuxnet code and discovered links between it and Siemens software that visualizes control systems. He realized that it was a government intervening, not a cyber gang.

Traced to Iran's Nuclear Program (03:20)

A USB stick was installed into the network and the worm searched for the human machine interface. A programmable logic controller manipulated the frequency converter of the plant and stalled the development of the program. David Sanger realized that "Operation Olympic Games" was created to stop an Israeli attack on Iranian Nuclear plants.

The Next Stuxnet (02:33)

Abutting the black forest, a public service plant is controlled remotely. Secured by fences, gates and locks, Eberhard Oehler, the director, worries of a cyberattack on the water or power supply.

Hiring a Hacker (03:36)

Oehler hired Felix "FX" Lindner to hack into the facility as a test. Lindner explains that older systems are built to keep things running, but are not designed to prevent attacks or analyze potential weaknesses. Lindner will attempt to turn off the lights.

Tel Aviv (02:45)

Israel creates a digital iron dome to protect its citizens from internet terrorist attacks. Frez Kreiner recognized that Israel's power, water and transportation systems were vulnerable to hackers and the country has become a leader in digital defense.

Trained in Cyberwarfare (03:42)

In Israel, the leader of Unit 8200 explains that their style is quick and dirty because they must act within a few hours or the information will be useless. Former Prime Minister Ehud Barak dodges questions about Israel's involvement with Stuxnet.

Attack on Ettlingen (03:22)

Lindner uses social networking to discover employee's emails and pertinent information about the plant. Boldewin explains how hackers infect a computer by emailing a PDF which installs a worm into the system. Hackers work carefully to avoid arousing suspicion.

"The Pirate" (02:00)

Most cyber warriors in Israel began in the 8200 unit. Guy Mizrahi explains that he creates cyber accessibility products for law enforcement and declines to discuss it further.

Working For a Digital Security Solution (02:21)

At NATO, Ian J. West heads up the division that investigates incidents of cyber warfare. His organization investigates over 2500 attacks each year.

Hacking Airplanes (03:15)

Digital attacks on civilian targets are considered a war crime, but disrupting activity in the enemy's computer is considered a legitimate attack. Jason Healey explains that the U.S. does not want a consistent international policy on cyber warfare, because it is initiating many of the attacks.

No Protection (02:53)

Linder dismisses Oehler's question on firewall software. At the "Black Hat" Hacker Conference, the participants are fascinated by the recent revelations from Edward Snowdin.

Military Surveillance (03:31)

At the "Black Hat" conference, NSA director Keith Alexander opens the conference, discussing the New York City bombing and how reading the suspects emails led to an arrest. Gabi Siboni skypes with Linder and Erel Margelet. They discuss why consumers expect privacy on the internet and Linder notes that the NSA is doing the same thing as google.

China's Military (03:34)

Because the Chinese military cannot compete with America's Navy and Air Force, China has focused on asymmetric warfare— cyber-attacks are part of their strategy. Tao Wan was a part of the Eagle Union, a group of hackers determined to hurt American business and government, created when America accidentally shot down a Chinese plane. He believes that American media is used by the government to help further its agenda.

Industrial Espionage (02:17)

The Chinese government spies on businesses to help their own industry. Huawai copied Cisco's components and added researchers— now its products have surpassed Cisco's. Volker Roth explains a targeted cyber-attack on an industry can hurt an entire region geopolitically and economically.

Lindner Succeeds (02:15)

Lindner enlists a friend to help hack the power company. While the friend distracts the secretary at a public service office, Linder plugs his computer into a network plug gets the information he needs. He gets into the control center and can turn off the power and water— it took him three days.

Far Reaching Ramifications (02:12)

Because Europe's electronic grid is connected, a few targeted attacks could disrupt the entire continent's power. After the hack, Oehler implements strategies to make a hack more difficult, but it is not impossible.

More Networks? (02:27)

Siemens pushes for larger networking solutions, which will cause even more security issues. Lindner suggests creating a new computer with increased security. Roth believes if Germany could build the prototype, the country would be the leader in cyber security and create huge profits.

Credits: Netwars — out of Control (00:38)

Credits: Netwars — out of Control

For additional digital leasing and purchase options contact a media consultant at 800-257-5126
(press option 3) or sales@films.com.

Netwars – Out of Control


DVD (Chaptered) Price: $169.95
DVD + 3-Year Streaming Price: $254.93
3-Year Streaming Price: $169.95

Share

Description

The Red Hackers in China, Unit 8200 in Israel, NATO, and the NSA all gather information on civilians and enemies through cyber warfare. In this video, Marcel Kolvenbach delves into these organizations and other private institutions that hack into computer networks for economic and political gain. Watch how Felix "FX" Linder successfully shuts off the power in Germany. 

Length: 53 minutes

Item#: BVL115483

ISBN: 978-1-68272-960-1

Copyright date: ©2014

Closed Captioned

Performance Rights

Prices include public performance rights.

Not available to Home Video and Publisher customers.

Only available in USA and Canada.


Share