Cyber-Kinetic Security Book

The book explores intricate interconnectedness of the cyber and physical worlds. As our interactions with physical objects increasingly rely on embedded computational systems, we unlock capabilities that surpass even the most ambitious predictions of past futurists. However, this fusion also introduces profound vulnerabilities.

The book describes in detail over 40 real-life cyber-kinetic incidents – cybersecurity incidents that resulted in injuries or fatalities. The book explores the potential threats of our cyber-connected world, reevaluates our current cybersecurity approaches, and offers strategies for risk reduction and mitigation in the face of cyber-kinetic attacks.

Completed in 2017, “Cyber-Kinetic Security” by Marin Ivezic was withdrawn from publication due to organizations impacted by the incidents mentioned in the book retracted their initial approval, choosing to keep the the incidents confidential.

While complying with the request, I firmly believe that keeping such information hidden is not beneficial. Sharing anonymized details of real-life incidents is crucial for raising awareness and imparting lessons learned. This can help other organizations prevent similar attacks. The articles that follow are adapted from non-controversial book chapters.

Other articles by date

Chemical Plant Cyber-Kinetic

Digital Actions, Lethal Consequences: A Cyber-Kinetic Risk Primer

Our physical world is becoming more connected – which makes it more dependent on the cyber world. Many physical objects around us are no longer just physical, but extend...
5G Open RAN Security

Can we afford to keep ignoring Open RAN security?

I’m skeptical of ‘futurists’. Work closely enough with the development of technology solutions and you’ll know that the only certain thing about the future is that it’s constantly changing....
Securing Society 5.0

Introducing Society 5.0

Self-help authors and politicians seem to agree on at least one thing: mindset matters. The shelves of bookstores worldwide are awash with motivational books by evangelical writers hoping to...
Securing Society 5.0 Introduction

Securing Society 5.0 – Overcoming the hidden threats in society’s greatest...

A term first coined by the Japanese government, “Society 5.0” describes "A human-centered society that balances economic advancement with the resolution of social problems by a system that highly...
5G Cloud Architecture

A Comparison of 5G Core Network Architectures

The 5G Core network is a Service Based Architecture. It evolves the traditional appliance based 4G Core Network to support services. It offers more agility and flexibility. The major building...
Open RAN Security

Open RAN May Be the Future of 5G, but Can We...

It's been a year of contradictions for the telecommunications industry. Like most sectors, it has been heavily impacted by the consequences of the Covid-19 pandemic, with a slowdown in global...
5G Cybersecurity Safety

Cybersecurity and Safety in the 5G-Enabled Smart-Everything World

Neil Harbisson calls himself a cyborg. Without the antenna implanted in his skull, he would not be able to see colour of any kind. Born with achromatopsia, a condition...
Smart Home Wireless Connectivity

Smart Home / Smart Building Connectivity Options and Their Cybersecurity

In a recent session on smart building cybersecurity, a student cheekily asked me "How did we ever connect anything before 5G?" At that moment I realized I might have...
5G Opportunity and Cybersecurity

Opportunity and Cybersecurity in the Age of 5G

The human will to innovate is seemingly relentless. The history of our species is one of continual development, with the last 350 years, in particular, representing staggering technological progress. The...
Quantum Computer 5G Security

The Quantum Computing Threat and 5G Security

Recently, in the science journal Nature, Google claimed ‘quantum supremacy’ saying that its quantum computer is the first to perform a calculation that would be practically impossible for a...
IIoT 5G Trust Security

IIoT and Trust and Convenience: A Potentially Deadly Combination

When microwave ovens first arrived on the market in 1967 they were met with public skepticism. Perhaps it was because, not long before, the same technology now promising to...
5G Connectivity Security

5G Network: A Quantum Leap in Connectivity – and Cyber Threats

The timeline of human history is marked by inflection points of major technological advancement. The plow, the printing press, the telegraph, the steam engine, electricity, the telephone, the internet:...
NFC Cybersecurity

NFC Security 101 (Non-5G IoT Connectivity Options)

NFC is a short range two-way wireless communication technology that enables simple and secure communication between electronic devices embedded with NFC microchip. NFC technology operates in 13.56 megahertz and...
RFID Cybersecurity

RFID Security 101 (Non-5G IoT Connectivity Options)

Radio-Frequency Identification (RFID) is a technology commonly used for identification, status administration and management of different objects. It is important for people identification, as it is commonly deployed in the...
Wi-Fi Cybersecurity

Wi-Fi Security 101 (Non-5G IoT Connectivity Options)

The Wi-Fi represents wireless technology that includes the IEEE 802.11 family of standards (IEEE 802.11a, IEEE 802.11b, IEEE 802.11g, IEEE 802.11n, IEEE 802.11ac, etc.). Within 50m range, it operates...
Bluetooth Cybersecurity

Bluetooth Security 101 (Non-5G IoT Connectivity Options)

Bluetooth is short-range wireless communications technology based on the IEEE 802.15.1 protocol. It works in a crowded license free 2.4 GHz frequency band and shares this resource with many...

Marin Ivezic's Personal Blog

Marin Ivezic

For 30+ years I’ve been protecting lives, well-being, the environment, and enterprises by bringing together cybersecurity, cyber-physical systems security, operational resilience, and functional safety approaches.
[This is a personal blog. Any views or opinions are personal. See Terms.]

See my main site Securing Society 5.0

Securing Society 5.0