Worm: The First Digital World War
Worm: The First Digital World War book cover

Worm: The First Digital World War

Hardcover – September 27, 2011

Price
$14.46
Format
Hardcover
Pages
288
Publisher
Atlantic Monthly Press
Publication Date
ISBN-13
978-0802119834
Dimensions
6.25 x 0.75 x 9.25 inches
Weight
1.15 pounds

Description

“Worm is worth attention. Government officials up to and including President Obama have taken notice of Conficker and begun to address some of the issues it raised.”— Bloomberg “When Mark Bowden writes, smart readers pay attention. . . . Bowden is a deserved brand name – a superb reporter and compelling narrative writer, whether his subject is war in a forlorn land ( Black Hawk Down , set in Somalia) or a variety of others in seven other books (Killing Pablo, Guests of the Ayatollah , etc.). And now we have the current masterpiece, Worm .”— The Philadelphia Inquirer “The author takes readers behind the scenes, showing the security specialists’ increasing frenzy, not to mention occasional infighting, as they worked to defeat the worm. Along the way, the author lucidly explains how malware can take over computers as well as how the very openness of the Internet makes it vulnerable to attack.”— Publishers Weekly “From the author of Black Hawk Down, a different sort of blood-and-thunder heroism narrative, out on the frontiers of cybercrime. . . . A brief, punchy reminder of our high-tech vulnerabilities.”— Kirkus Reviews “Bowden . . . gives this account of the computer world’s efforts to neutralize the Conficker worm the flavor of a riveting report from the digital battlefield’s front lines. . . . A nerve-wracking but first-rate inside peek into the world of cybercrime and its vigilant adversaries.”— Booklist “[T]he thumbs of every 30-something üntergeek will still Tweet in ecstasy at seeing technical terms like NCP/IP, Port 445, and MS08-067 spread across the pages of a mainstream book. But the rest of us should take Mark Bowden’s warnings with the utmost seriousness because of the growing threats to our wired world.”— New York Journal of Books Mark Bowden is the author of seven books, including Black Hawk Down , The Best Game Ever , Killing Pablo , and Guests of the Ayatollah . He reported at The Philadelphia Inquirer for twenty years and now writes for Vanity Fair , The Atlantic , and other magazines. He lives in Oxford, Pennsylvania. Excerpt. © Reprinted by permission. All rights reserved. Worm The First Digital World War By Mark Bowden Atlantic Monthly Press Copyright © 2011 Mark BowdenAll right reserved. ISBN: 978-0-8021-1983-4 Chapter One Zero NEW MUTANT ACTIVITY REGISTERED —X-Men; The Age of Apocalypse The new worm in Phil Porras's digital petri dish was announced in the usual way: a line of small black type against a white backdrop on one of his three computer screens, displaying just the barest of descriptors—time of arrival ... server type ... point of origin ... nineteen columns in all. The readout began: 17:52:00 ... Win2K-f ... 201.212.167.29 (NET.AR): PRIMA S.A, BUENOS AIRES, BUENOS AIRES, AR. (DSL) ... It was near the end of the workday for most Californians, November 20, 2008, a cool evening in Menlo Park. Phil took no notice of the newcomer at first. Scores of these digital infections were recorded on his monitor every day, each a simple line on his Daily Infections Log—actually, his "Multi perspective Malware Infection Analysis Page." This was the 137th that day. It had an Internet Protocol (IP) address from Argentina. Spread out across the screen were the infection's vitals, including one column that noted how familiar it was to the dozens of antivirus (AV) companies who ride herd on malicious software (malware). Most were instantly familiar. For instance, the one just above was known to all 33 of the applicable AV vendors. The one before that: 35 out of 36. This one registered a zero in the recognition column: 0 of 37. This is what caught his eye when he first noticed it on his Log. Zero. Outside it was dark, but as usual Phil was still at his desk in a small second-story office on the grounds of SRI International, a busy hive of labs, hundreds of them, not far from Stanford University. It is a crowded cluster of very plain three-story tan-and-maroon buildings arrayed around small parking lots like rectangular building blocks. There is not a lot of green space. It is a node of condensed brainpower, one of the best-funded centers for applied science in the world, and with about seventeen hundred workers is the second-largest employer in Menlo Park. It began life as the Stanford Research Institute—hence the initials SRI—but it was spun off by the university forty years ago. It's a place where ideas become reality, the birthplace of gizmos like the computer mouse, ultrasound imagery machines, or tiny robot drones. The trappings of Phil's office are simple: a white leather couch, a lamp, and a desk, which is mostly taken up by his array of three computer monitors. On the walls are whiteboards filled with calculations and schematics and several framed photos of vintage World War II fighter planes, vestiges of a boyhood passion for model building. The view out his window, through a few leafy branches, is of an identical building across an enclosed yard. It could be any office in any industrial park in any state in America. But what's remarkable about the view from behind Phil's desk has nothing to do with what's outside his window. It's on those monitors. Spread out in his desktop array of glowing multicolored pixels is a vista of cyberspace equal to ... say, the state of Texas. One of the inventions SRI pioneered was the Internet. The research center is a cornerstone of the global phenomenon; it owned one of the first two computers formally linked together in 1969, the first strand of a web that today links billions. This was more than two decades before Al Gore popularized the term "information superhighway." There at the genesis, every computer that connected to the nascent network was assigned its own 32-bit identity number or IP address, represented in four octets of ones and zeros. Today the sheer size of the Internet has necessitated a new system that uses 128-bit addresses. SRI ceded authority for assigning and keeping track of such things years ago, but it retains ownership of a very large chunk of cyberspace. Phil's portion of it is a relatively modest, nothing-to-brag-about-but-damned-hard-to-get, "slash 16," a block of the original digital universe containing 65,536 unique IP addresses—in other words, the last two octets of its identity number are variable, so that there are two to the sixteenth (2 16 ) possible distinct addresses, one for each potential machine added to its network. It gives him what he calls "a large contact surface" on the Internet. He's like a rancher with his boots propped on the rail on the front porch before a wide-open prairie with, as the country song says, miles of lonesome in every direction. It's good for spotting intruders. Phil's specialty is computer security, or, rather, Internet security, because few computers today are not linked to others. Each is part of a network tied to another larger network that is in turn linked to a still larger one, and so on, forming an intricate invisible web of electrons that today circle the Earth and reach even to the most distant parts of our galaxy (if you count those wayfaring NASA robot vehicles sending back cool snapshots from mankind's farthest reach into space). This web is the singular marvel of the modern age, a kind of global brain, the world at everyone's fingertips. It is a tool so revolutionary that we have just begun to glimpse its potential—for good and for evil. Out on his virtual front porch, Phil keeps his eyes peeled for trouble. Most of what he sees is routine, the viral annoyances that have bedeviled computer users everywhere for decades, illustrating the principle that any new tool, no matter how helpful, will also be used for harm. Viruses are responsible for such things as the spamming of your in-box with come-ons for penis enlargement or million-dollar investment opportunities in Nigeria. Some malware is designed to damage or destroy your computer, or threaten to do so unless you purchase a remedy (which turns out to be fake). When you get hit, you know it. But the newest, most sophisticated computer viruses, like the most successful biological viruses, have bigger ambitions, and are designed for stealth. They would be noticed only by the most technically capable and vigilant of geeks. For these, you have to be looking. Anything new was enough to make Phil's spine tingle. He had been working with computers since he was in high school in Whittier, California, and had sent away in 1984 for a build-it-yourself personal computer. Back then personal computers were not yet on the market. Small companies catered to a fringe community of users, many of them teenagers, who were excited enough and smart enough to see the potential for home use. They would order kits and assemble the machines themselves, using them to play games, mostly, or configuring them to perform simple household or business chores. Phil's dad was an accountant, and his mom ran a care center for senior citizens, so he amazed them by programming his toy to handle time-consuming, monotonous tasks. But mostly he played games. He took computer classes in high school, contributing at least as much as he took away, and in college at the University of California, Irvine, he fell in with a group of like-minded geeks who amused themselves by showing off their programming skills. At the time—this was in the late 1980s—Sun Microsystems dominated the software world with "Solaris," an operating system with a reputation for state-of-the-art security features. Phil and his friends engaged in a game of one-upmanship, hacking into the terminals in their college labs and playing pranks on each other. Some of the stunts were painful. Victims might lose a whole night of work because their opponent had remotely reprogrammed their keyboard to produce gibberish. So Phil's introduction to computer warfare, even at this prank stage, had real consequences. It was a world where you either understood the operating system enough to fend off an attack, or got screwed. This kind of competition—mind you, these were very few geeks competing for very small stakes—nevertheless turned Phil into an aggressive expert in computer security. So much so that when he graduated, he had to go shopping for a professor at the graduate level who could teach him something. He found one in Richard Kemmerer at the University of California at Santa Barbara (UCSB), one of the only computer security academics in the country at the time, who quickly recognized Phil as more of a peer than a student. The way you capitalized on superior hacking skills in academia was to anticipate invasion strategies and devise way of detecting and fending them off. Phil was soon recognized as an expert in the newly emerging field. Today, UCSB has one of the most advanced computer security departments in the world, but back in the early 1990s, Phil was it. When UNIX-5 was purported to be the most secure operating system in the business, Phil cooked up fifty ways to break into it. When he was twenty years old, he was invited to a convention on computer security at SRI, where he presented his first attempts to design software that would auto-detect his impressive array of exploits. The research institute snapped him up when he finished his degree, and over the next two decades Phil's expertise has evolved with the industry. Phil has seen malware grow from petty vandalism to major crime. Today it is often crafted by organized crime syndicates or, more recently, by nation-states. An effusive man with light brown skin and a face growing rounder as he approaches middle age, he wears thin-framed glasses that seem large for his face, and has thick brown hair that jumps straight up on top. Phil is a nice guy, a good guy . One might even say he's a kind of superhero. In cyberspace, there really are bad guys and good guys locked in intense cerebral combat; one side cruises the Internet for pillage and plunder, the other to prevent it. In this struggle, Phil is nothing less than a giant in the army of all that is right and true. His work is filled with urgent purpose and terrific challenges, a high-stakes game of one-upmanship in a realm that few people comprehend. Like most people who love their work, Phil enjoys talking about it, to connect, to explain—but the effort is often doomed: ... So what we ended up doing is, see, we ended up becoming really good at getting ourselves infected. Like through a sandnet. Executing the malware. Finding the IRC site and channel that was being exploited by the botmaster and simply going after it. Talking to the ISP and directly attacking. Bringing it down. Bringing down the IRC server or redirecting all IRC communications to use ... He tries hard. He speaks in clipped phrases, ratcheting down his natural mental velocity. But still the sentences come fast. Crisp. To the point. You can hear him straining to avoid the tricky territory of broader context, but then, failing, inevitably, as his unstoppable enthusiasm for the subject matter slips out of low gear and he's off at turbo speed into Wired World: ... bringing down the IRC server ... the current UTC date ... exploiting the buffer's capacity ... utilizing the peer-to-peer mechanism ... Suffice it to say, Phil is a man who has come face-to-face many times with the Glaze, the unmistakable look of profound confusion and uninterest that descends whenever a conversation turns to the inner workings of a computer. The Glaze is familiar to every geek ever called upon to repair a malfunctioning machine— Look, dude, spare me the details, just fix it! Most people, even well-educated people with formidable language skills, folks with more than a passing knowledge of word-processing software and spreadsheets and dynamic graphical displays, people who spend hours every day with their fingertips on keyboards, whose livelihoods and even leisure-time preferences increasingly depend on fluency with a variety of software, remain utterly clueless about how any of it works. The innards of mainframes and operating systems and networks are considered not just unfathomable but somehow unknowable, or even not worth knowing , in the way that many people are content to regard electricity as voodoo. The technical side of the modern world took a sharp turn with the discovery of electricity, and then accelerated off the ramp with electromagnetism into the Realm of the Hopelessly Obtuse, so that everyday life has come to coexist in strict parallel with a mysterious techno dimension. Computer technology rubs shoulders with us every day, as real as can be, even vital, only ... also ... not real . Virtual. Transmitting signals through thin air. Grounded in machines with no visible moving parts. This techno dimension is alive with ... what exactly? Well-ordered trains of electrons? Binary charges? That digital ranch Phil surveys? It doesn't actually exist, of course, at least not in the sense of dust and sand and mesquite trees and whirling buzzards and distant blue buttes. It exists only in terms of capacity, or potential. Concepts like bits and bytes, domain names, ISPs, IPAs, RPCs, P2P protocols, infinite loops, and cloud computing are strictly the province of geeks or nerds who bother to pay attention to such things, and who are, ominously, increasingly essential in some obscure and vaguely disturbing way to the smooth functioning of civilization. They remain, by definition, so far as the stereotype goes, odd, remote, reputed to be borderline autistic, and generally opaque to anyone outside their own tribe— THEY ARE MUTANTS , BORN WITH ABILITIES FAR BEYOND THOSE OF NORMAL HUMANS . The late M.I.T. professor Joseph Weizenbaum identified and described the species back at the dawn of the digital age, in his 1976 book Computer Power and Human Reason : Wherever computer centers have become established, that is to say, in countless places in the United States, as well as in all other industrial regions of the world, bright young men of disheveled appearance, often with sunken glowing eyes, can be seen sitting at their computer consoles, their arms tensed and waiting to fire their fingers, already poised to strike, at the buttons and keys on which their attention seems to be riveted as a gambler's on the rolling dice. When not so transfixed, they often sit at tables strewn with computer printouts over which they pore like possessed students of a cabalistic text. They work until they nearly drop, twenty, thirty hours at a time. Their food, if they arrange it, is brought to them: Cokes, sandwiches. If possible, they sleep on cots near the computer. But only for a few hours—then back to the console or printouts. Their rumpled clothes, their unwashed and unshaven faces, and their uncombed hair all testify that they are oblivious to their bodies and the world in which they move. They exist, at least when so engaged, only through and for computers. These are computer bums, compulsive programmers. They are an international phenomenon. The Geek Tribe today has broadened to include a wider and more wholesome variety of characters—Phil played a lot of basketball in high school and actually went out with girls—and there is no longer any need need for "printouts" to obsess over—everything is on-screen—but the Tribe remains international and utterly obsessed, linked 24/7 by email and a host of dedicated Internet chat channels. In one sense, it is strictly egalitarian. You might be a lonely teenager with pimples in some suburban basement, too smart for high school, or the CEO of some dazzling Silicon Valley start-up, but you can join the Tribe so long as you know your stuff. Nevertheless, its upper echelons remain strictly elitist; they can be as snobby as the hippest Soho nightclub. Some kind of sniff test applies. Phil himself, for instance, was kept out of the inner circle of geeks fighting this new worm for about a month, even though he and his team at SRI had been at it well before the Cabal came together, and much of the entire effort rested on their work. Access to a mondo mainframe or funding source might gain you some cachet, but real traction comes only with savvy and brainpower. In a way, the Tribe is as virtual as the cyber-world itself. Many members have known each other for years without actually having ever met in, like, real life . Phil seems happiest here, in the glow of his three monitors, plugged into his elite global confederacy of the like-minded. (Continues...) Excerpted from Worm by Mark Bowden Copyright © 2011 by Mark Bowden. Excerpted by permission of Atlantic Monthly Press. All rights reserved. No part of this excerpt may be reproduced or reprinted without permission in writing from the publisher.Excerpts are provided by Dial-A-Book Inc. solely for the personal use of visitors to this web site. Read more

Features & Highlights

  • From the author of
  • Black Hawk Down
  • comes the story of the battle between those determined to exploit the internet and those committed to protect it—the ongoing war taking place literally beneath our fingertips.The Conficker worm infected its first computer in November 2008 and within a month had infiltrated 1.5 million computers in 195 countries. Banks, telecommunications companies, and critical government networks (including the British Parliament and the French and German military) were infected. No one had ever seen anything like it. By January 2009 the worm lay hidden in at least eight million computers and the botnet of linked computers that it had created was big enough that an attack might crash the world. This is the gripping tale of the group of hackers, researches, millionaire Internet entrepreneurs, and computer security experts who united to defend the Internet from the Conficker worm: the story of the first digital world war.

Customer Reviews

Rating Breakdown

★★★★★
30%
(112)
★★★★
25%
(93)
★★★
15%
(56)
★★
7%
(26)
23%
(86)

Most Helpful Reviews

✓ Verified Purchase

Should interest newbies and experts alike

One of the greatest things about airport bookstores - they often ignore sale dates. I purchased Worm a few days ago without realizing it wasn't supposed to be released yet. Which is good, because it made that flight from Denver to Baltimore tolerable.

First things first. If you are a network newbie, you will be coddled by this book. You don't need to have your MCSE or CISSP to read "Worm". Bowden does a good job of breaking down salient data - what is TCPIP, what is RPC - and creating explanations that make sense. Don't know why Port 445 is so special? Wonder why Windows is so often the target of malware around the world? (the technical explanation, not the political answer) You will after reading this book. It won't win you any medals at the next Cisco shareholders meeting or net you a job in IT, but at least you'll know why Patch Tuesday is important and why malware isn't just a problem with code - it's a social engineering problem, too.

The next best thing about this book is how much it stresses that the Internet is still in it's adolescence. It's a hodgepodge of ancient protocols and new-fangled protocols shoehorned into communicating with one another, and that's a fragile animal. you'll wonder why it doesn't go down more often.

"Worm" is entertaining and informative. Personally, I think it's too short. You'll get a quick bio about a particular researcher, follow them through some problem solving and then, inexplicably, drop them entirely while picking up with another researcher. I think the personalities involved are as important as the science. But those quibbles are trivial.
122 people found this helpful
✓ Verified Purchase

This Will Really Get You Thinking About Computer Security!

Author Bowden does a great job of summarizing malware in general, and the Conficker worm in particular. He begins by explaining that there are three types of malware - Trojans, viruses, and worms. A Trojan is a piece of software that masquerades as one thing to get inside a computer, then attacking. A virus attacks its host computer after entering its operating system - it depends on the operator opening an e-mail attachment or clicking on a lilnk. A worm works like a virus, but doesn't attack once it enters - it's primarily designed to spread, then wait for instructions delivered later.

Some computer malware is intended to damage or destroy one's computer, and victims quickly realize the problem. A computer worm, by contrast, is a packet of computer code designed to infiltrate a computer without attracting attention and then scans for others to invade, spreading exponentially. The Conficker computer worm emerged in November, 2008 and infiltrated 1.5 million of the world's computers in the first month. By January, 2009 it had spread to at least 8 million computers, exploiting flaws in Microsoft Windows that it closed after entering. They constantly check with its unknown creaters at their unknown location for directions. Frustrated cyber-security experts at Microsoft, Symantec, SRI International, etc. have merged forces to try and defeat it - so far they've been unsuccessful. Bowden's 'Worm' tells how hackers, entrepreneurs, and computer security experts are trying to defend the Internet from Conficker - what the author calls 'the first digital world war.'

In the 'good old days,' infected computers slowed down because user commands had to compete with viral invaders for processing power. Computers would slow down, and programs would freeze. Worm-linked computers ('botnets') can be used to steal information, assist fraudulent schemes, or launch denial-of-service attacks. So far, Conficker (35 kilobytes of code - less than a 2,000-word document) has done none of those things, and been activated only once to perform a short, simple spamming operation that sold a fake anti-spyware program for two weeks, then stopped.

The Microsoft operating system has over 65,000 ports designed to transmit and receive certain kinds of data. Conficker exploited Port 445, which Microsoft had tried to repair 10/23/2008. Firewalls are security programs that guard these ports, but Port 445 was vulnerable even when protected by a firewall if both print-sharing and file-sharing were enabled. However, many fail to apply new patches promptly, and others run pirated Windows systems which Microsoft doesn't update. Thus, reverse-engineering patches allows attackers to create targeted worms.

Experts trying to disable Conficker have learned that it tries to prevent communication with security providers, it avoided Ukrainian IP addresses, and disabled system restore points that allowed users to reset infected machines to a date prior to infection. To prevent IT-defenders from predicting how the infected computer would try to communicate home by setting the computer's clock ahead and then watching what happened (it generates 250 random-codes/day for each of 8 domains - eg. .com, .edu, .uk, etc.). Conficker-infected computers use system clocks (eg. Google, Yahoo) that can't be set ahead. The 'bad guys' only have to pay $10 to register one address, and wait for botnetted computers to make contact. Unfortunately for computer defenders, that communication used coding techniques employed in the latest standard, MD-6, revised.

Defenders, however, were flooded by 50,000 domain names/day needing investigation. Each requires checking to ensure it belongs to a good guy, and their spread out all over the world. Worse yet, a newer version introduced peer-to-peer communication, meaning that all infected computers no longer needed to call home for instructions, and defenders no longer have any way of telling how many computers are infected.

Another insidious Conficker attribute is that it could also be spread by USB drives - thus, systems not connected to the Internet were also vulnerable.

Most of the world's 'best' malware comes from Eastern Europe, drawing on high levels of technical expertise and organized criminal gangs. That's a very big area within which to search.
28 people found this helpful
✓ Verified Purchase

Really - Save Your Money

I love Bowden's work. Couldn't stop turning pages in Black Hawk Down. This is not BHD. Actually, it's rather an embarrassment. Basically a magazine article plumped out with a lot of hype on which he really can't deliver. He could have overcome this limitation - after all, Conficker never really did do very much active damage -- by discussing other worms, the future prospects of malware, etc. etc. Instead, he fills up the book with page after page of *verbatim* text taken from the Cabal's listserv as they fuss with one another. After awhile, I found myself skimming for some actual content, waiting for the beef. There isn't any. Saver your money -- buy one of Kevin Munchnik's books. There's really only a long Vanity Fair article here. Bowden should be ashamed.
14 people found this helpful
✓ Verified Purchase

Not up to his usual standard

I'm a fan of Bowden, but this feels more like a long article than a book. Partly because of the anticlimactic nature of the story itself, it certainly isn't the real-life thriller that the promotional material suggests it is. I'm not particularly computer-savvy, but even I found the extensive explanations of how the internet works, complete with far-out metaphors, to be distracting. There's a secret agent in Captain Kirk's starship Enterprise? Really Mark?? He talks more like someone explaining to their mother over the phone how to install the latest version of Turbotax than someone talking to a broad audience with a reasonable grasp of the internet. The later parts of the book are filled out with very extensive extracts of emails from the members of the conficker working group, at the expense of engaging storytelling. A surprising number of spelling errors (in the Kindle edition, at least) make it seem as if this was rushed to press. Overall, it's worth an afternoon of your time to read, but I sure wouldn't pay the full list price.
11 people found this helpful
✓ Verified Purchase

Horrendous spelling and grammar makes for a torturous read

After hearing interviews with Mark Bowden (with respect to this book) on NPR recently, I reserved a copy from my local library system and waited with anticipation for my name to reach the head of the queue.

Picked it up yesterday at lunchtime and set it aside for a good read last night.

I was sorely disappointed and so glad I didn't actually purchase it.

Grammatical and spelling errors abound. That is no exaggeration. For a book of this length, I would expect maybe one or two errors at most. This book is rife with spelling and grammatical errors, to the point where they detract from the readability.

Maybe this isn't the author's fault - maybe the publisher can't afford proof-readers (which I find hard to comprehend in this electronic age where all they need to is email a PDF to somebody). Regardless of whose fault it actually is, it does reflect badly on the author and the publisher.

Unreadability aside, the message I received from the book was inconclusive. Yes, malware is an issue. This is hardly news to anyone involved in the IT industry. The retelling of the early days of Microsoft is just a bore (Altair 8080, really?).

Sorry, this book just didn't sit well with me. The publisher should have saved the paper for a better read.

The author, on the other hand, comes across very well in radio interviews - there's just some kind of disconnect between his spoken message and the media of this book.
10 people found this helpful
✓ Verified Purchase

The Fragile Internet

We have been one command away from catastrophe for a long time now ~ Paul Vixie as quoted in the book.

A worm is a small packet of information, rather like a virus in a human although not like a virus as we use that term in computers, that borrows deep inside your Windows operating system and waits for instructions from somewhere outside of your computer. It isn't there in particular to take out your computer, although it can, but to unite with others to act together to do something like take down the electric grid in the USA or even the internet if that is the intention. You don't have to open an email or go to some website to get it. If you are on the internet, and use Windows, it can find you. Oh yes, it can come through your USB port. It is a bit more complicated than that but that's the basics.

Worm tells the story of the Conficker Worm From the time it first showed its face in what is known as a honeynet through its updating and where it stands today. A honeynet looks like a bunch of computers on the internet but is really just one computer that is watching what is picked up. If you have lots of computers, you are more likely to pick up a virus, worm or trojan. There are people out there who are monitering the internet, some of whom are even being paid to do it. (I have to admit that my cynicism took a bit of a blow learning that there are people out there protecting the internet for free)

What makes this interesting to me, is that it introduces us to the "good" guys in this war. The old idea of a young male hacking into computers for fun? Well, some of those guys grew up to be the White Hats as they refer to themselves. And they do all seem to be men. They find some of the same challenge that had them breaking into computers in pitting their intelligence against the Black Hats who are every bit as intelligent as themselves.

Someone in a review complained that the ending is anticlimatic. Well yes, the worm is still out there. It hasn't done anything except send out spam for a very short time for a fake antivirus program, perhaps to show what it could do if it wanted to. But I think it is a glimpse into the near future. Maybe this worm is so well watched that it will never really do anything but what about other worms? Recently a worm disrupted uranium production in Iran. There are countries that would prefer that Iran not have the bomb. Using the word 'war' in the title probably doesn't help either. Sadly, a war without bombs and dust and places that can be watched on TV doesn't hold many people's attention.

Another reviewer complained about the extensive explainations. I'm a woman in her 60s, about as far away from what people think of when they hear geek. I understood this book. (disclosure: I read Martin Gardner so there is some geek in me)

I found the book interesting. I recommend it.
9 people found this helpful
✓ Verified Purchase

Did no one EDIT this book????

I like Bowden and his books, but SHAME, SHAME, SHAME on whomever edited Worm. There are multiple spelling errors and omitted words that I found excruciatingly distracting.

For example, on more than a couple of occasions, "domain" is spelled "domian." I was urged to write a review, when on page 148, I read "ICANN would wave the fees."

"Wave" the fees? Really.

There's even a section that the word "manyfold" was appropriate, but instead, the text read "manifold."

page 35, "incresing?" A book about computers doesn't use SPELLCHECK?

For most of the book, the worm is called "Conficker." Then, for an entire chapter, it's repeatedly called "Conflicker."

Was this book rushed to print?

I am considering writing to Atlantic Monthly (Grove) Press and asking for a refund.
8 people found this helpful
✓ Verified Purchase

Great beginning, pretty bad afterwards!

I LOVE the beginning of the book, but unfortunately that was the extend of it. It was really exciting at the beginning, reading about the attack timeline, how the worm progressed, how the X-men tried to stop it and so on. But half way through the book it lost me. Page after page I saw copy-and-paste of emails between people. It frankly started to REALLY bother me, I found it very disappointing. The storyline became more about what emails were sent back and forth, and the personality conflicts between what seemed to be random people on the x-men team. I found the story disconnected at that point. As I mentioned the first few chapters were really good, but I had a hard time going through the rest, particularly reading page after page of email copy-and-paste!
7 people found this helpful
✓ Verified Purchase

Lightweight reading

Mark Bowden is better known for his other non-fiction (non-technology) books Black Hawk Down and Killing Pablo. He has a background as a journalist and has contributed to The Atlantic magazine. I was curious to know how a non-tech journalist would handle a story as complex as the Conficker botnet as some of the subtleties of technology are lost on people from outside the field.

In terms of timing Worm couldn't have come out at a better time, Stuxnet autopsies were shedding light on the complexity of the software used to cripple Iran's nuclear programme and at the time of my reading the book the details of FLAME started to permeate out into the public view.

Bowden did a good job getting to grips with the personalities that he chose to follow around Conficker and the hapless nature of the US government in facing the potential threat posed by Conficker; but I don't think that he got under the skin of hacker culture or the technology.

Because of this aspects of the characters become cartoon-like and the technology in an overly superficial way that is more Marvel than Discovery Channel. And since no one knows who really built Conficker or what it was really designed to do it feels like one of them TV series that gets cut by the network half-way through first run with the script writers desperately trying to tidy away loose ends.

I found the book a welcome break from the academic books that seem to be my life at the moment, but somewhat wanting in terms of substance.
5 people found this helpful
✓ Verified Purchase

Mark Bowden takes readers on another adventure...

Woohoo!! Mark Bowden takes his readers on a crazy adventure with danger lurking everywhere, only this time there aren't any bullets flying, helicopters crashing or hostages being taken. Here we have elite nerds (he calls them the Tribe) and their Mountain Dew doing what they do, pulling all-nighters on their computers. The book starts off with all sorts of potential, but starts to dwindle into repetitive statements about how big the threat of Conficker is/was, and long passages of internet forum (the List) drama. Anybody who is a Redditor, goes to forums, or reads comments on news websites/blogs knows what I mean by internet drama, fueled by not being face to face with others. Also, as other reviewers have mentioned Bowden seems to mix some timelines up. In one case referencing an internet attack in 2002 and saying " This event was important. It was a sobering demonstration for those paying attention, which is to say the Tribe...The vast majority of Internet users remained oblivious. So long as Google and YouTube and Facebook kept humming along..." In 2002 YouTube and Facebook weren't even around, and Google was nowhere near what it is today.

Overall, I enjoyed this book and don't regret spending the time to read it. At the very least, it gave me insight into the world of cyber-security, and some of the culture surrounding it. This is one of the main things I like about Mark Bowden's books, they aren't just filled with facts, they are filled with a sort of insight that gives readers (or at least me) a feeling of experience. However since it is not on par with some of Bowden's other works such as Black Hawk Down or Killing Pablo, fans may be disappointed.
5 people found this helpful