ABSTRACT

In May 2021, Jim Gosler, known as the Godfather and commander of US agencies’ cyber offensive capability, said, ''Either the Intelligence Community (IC) would grow and adapt, or the Internet would eat us alive.'' Mr Gosler was speaking at his retirement only several months before the terrorist attacks of 9/11. He possibly did not realise the catalyst or the tsunami that he and his tens of thousands of US IC offensive website operatives had created and commenced.

Over the last two decades, what Mr Gosler and his army of Internet keyboard warriors created would become the modus operandi for every faceless, nameless, state-sponsored or individual cybercriminal to replicate against an unwary, ill-protected, and ignorant group of executives and security professionals who knew little to nothing about the clandestine methods of infiltration and weaponisation of the Internet that the US and UK agencies led, all in the name of security.

This book covers many cyber and ransomware attacks and events, including how we have gotten to the point of massive digital utilisation, particularly during the global lockdown and COVID-19 pandemic, to online spending that will see twice the monetary amount lost to cybercrime than what is spent online.

There is little to no attribution, and with the IC themselves suffering cyberattacks, they are all blamed on being sophisticated ones, of course. We are witnessing the undermining of our entire way of life, our economies, and even our liberties. The IC has lots to answer for and unequivocally created the disastrous situation we are currently in. They currently have little to no answer. We need—no, we must demand—change. That change must start by ensuring the Internet and all connections to it are secure and no longer allow easy access and exfiltration for both the ICs and cybercriminals.

chapter 2|9 pages

Not Secure, F and O…

chapter 3|6 pages

Ransomware Lessons Being Learned…

chapter 4|6 pages

Colonial Pipeline and CI Companies

chapter 5|9 pages

CNA Ransomware Attack and Cyber Insurance

chapter 6|4 pages

BA, easyJet, and the Travel Industry

chapter 9|7 pages

Ensuring the Security of Insecurity

chapter 11|6 pages

Survivorship Bias

chapter 12|5 pages

Air India Ransomware Faux Pas

chapter 15|7 pages

MITRE CWE and Ransom Task Force

chapter 18|7 pages

Conflicts of Interest

chapter 19|5 pages

Innovation and Disbelief

chapter 21|6 pages

The World's Largest Global Economic Shift

chapter 23|5 pages

Avoiding the Apocalypse