Buy new:
-43% $10.79
FREE delivery Thursday, May 9 on orders shipped by Amazon over $35
Ships from: Amazon.com
Sold by: Amazon.com
$10.79 with 43 percent savings
List Price: $18.99

The List Price is the suggested retail price of a new product as provided by a manufacturer, supplier, or seller. Except for books, Amazon will display a List Price if the product was purchased by customers on Amazon or offered by other retailers at or above the List Price in at least the past 90 days. List prices may not necessarily reflect the product's prevailing market price.
Learn more
Get Fast, Free Shipping with Amazon Prime FREE Returns
FREE delivery Thursday, May 9 on orders shipped by Amazon over $35
Or fastest delivery Wednesday, May 8. Order within 18 hrs 19 mins
In Stock
$$10.79 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$10.79
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Ships from
Amazon.com
Ships from
Amazon.com
Sold by
Amazon.com
Sold by
Amazon.com
Returns
Eligible for Return, Refund or Replacement within 30 days of receipt
Eligible for Return, Refund or Replacement within 30 days of receipt
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Returns
Eligible for Return, Refund or Replacement within 30 days of receipt
This item can be returned in its original condition for a full refund or replacement within 30 days of receipt.
Payment
Secure transaction
Your transaction is secure
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
Payment
Secure transaction
We work hard to protect your security and privacy. Our payment security system encrypts your information during transmission. We don’t share your credit card details with third-party sellers, and we don’t sell your information to others. Learn more
$9.99
Get Fast, Free Shipping with Amazon Prime FREE Returns
A readable copy. All pages are intact, and the cover is intact. Dust jacket may be missing. Pages can include considerable highlighting markings writing but cannot obscure the text. May be an Ex-lib. copy and have standard library stamps and or stickers. May NOT include discs, or access code or other supplemental material. Ships directly from Amazon and is eligible for Prime or super saver FREE shipping. A readable copy. All pages are intact, and the cover is intact. Dust jacket may be missing. Pages can include considerable highlighting markings writing but cannot obscure the text. May be an Ex-lib. copy and have standard library stamps and or stickers. May NOT include discs, or access code or other supplemental material. Ships directly from Amazon and is eligible for Prime or super saver FREE shipping. See less
FREE delivery Thursday, May 9 on orders shipped by Amazon over $35
Or fastest delivery Wednesday, May 8. Order within 18 hrs 19 mins
Only 1 left in stock - order soon.
$$10.79 () Includes selected options. Includes initial monthly payment and selected options. Details
Price
Subtotal
$$10.79
Subtotal
Initial payment breakdown
Shipping cost, delivery date, and order total (including tax) shown at checkout.
Access codes and supplements are not guaranteed with used items.
Loading your book clubs
There was a problem loading your book clubs. Please try again.
Not in a club? Learn more
Amazon book clubs early access

Join or create book clubs

Choose books together

Track your books
Bring your club to Amazon Book Clubs, start a new book club and invite your friends to join, or find a club that’s right for you for free.
Kindle app logo image

Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.

Read instantly on your browser with Kindle for Web.

Using your mobile phone camera - scan the code below and download the Kindle app.

QR code to download the Kindle App

Follow the author

Something went wrong. Please try your request again later.

Dark Territory: The Secret History of Cyber War Paperback – March 28, 2017

4.4 4.4 out of 5 stars 991 ratings

{"desktop_buybox_group_1":[{"displayPrice":"$10.79","priceAmount":10.79,"currencySymbol":"$","integerValue":"10","decimalSeparator":".","fractionalValue":"79","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"6W4QYhLscCt%2FGX3BLwl88TCugK5Z9fUvHi5BCtPpuS90YmCnDGTtzWCFVOGpW03%2BbdL0XkPEg29E2inetW76RtgC7oa%2BpYyviXsNlXSDHpnchk40WCglDUOcS4CKI4hmHx9qZiYbfhe3d3jikrtfng%3D%3D","locale":"en-US","buyingOptionType":"NEW","aapiBuyingOptionIndex":0}, {"displayPrice":"$9.99","priceAmount":9.99,"currencySymbol":"$","integerValue":"9","decimalSeparator":".","fractionalValue":"99","symbolPosition":"left","hasSpace":false,"showFractionalPartIfEmpty":true,"offerListingId":"6W4QYhLscCt%2FGX3BLwl88TCugK5Z9fUvLZ%2B6ljdHiSYRAP1ThJhrpADrWO%2BkvYaBl8NGIjDZoaEo7%2FG4jfAHRKBiiogJ5dFRm1nzaePHKwiABrO4%2B54V82gVmYp7WmomVmcXSBp8G1BqodOs6MYqvoRQ1Z1p%2F6U9tqhEavzAZ8vVNhL2jwYwKisRv0c4LfZh","locale":"en-US","buyingOptionType":"USED","aapiBuyingOptionIndex":1}]}

Purchase options and add-ons

“An important, disturbing, and gripping history” (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars—where every country can be a major power player and every hacker a mass destroyer.

In June 1983, President Reagan watched the movie
War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer security.

From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role,
Dark Territory chronicles a little-known past that shines an unsettling light on our future. Fred Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the “information warfare” squads of the military services, and the national security debates in the White House to reveal the details of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning—and (more often than people know) fighting—these wars for decades.

“An eye-opening history of our government’s efforts to effectively manage our national security in the face of the largely open global communications network established by the World Wide Web….
Dark Territory is a page-turner [and] consistently surprising” (The New York Times).

The Amazon Book Review
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now

Frequently bought together

$10.79
Get it as soon as Thursday, May 9
In Stock
Ships from and sold by Amazon.com.
+
$14.29
Get it as soon as Thursday, May 9
In Stock
Ships from and sold by Amazon.com.
+
$14.99
Get it as soon as Thursday, May 9
In Stock
Ships from and sold by Amazon.com.
Total price:
To see our price, add these items to your cart.
Details
Added to Cart
Choose items to buy together.

Editorial Reviews

Review

"A compelling history of cyberwarfare." -- Evan Osnos ― The New Yorker

“A consistently eye-opening history of our government’s efforts to effectively manage our national security in the face of the largely open global communications network established by the World Wide Web. . . . The great strengths of
Dark Territory . . . are the depth of its reporting and the breadth of its ambition. . . . The result is not just a page-turner but consistently surprising. . . . One of the most important themes that emerges from Mr. Kaplan’s nuanced narrative is the extent to which defense and offense are very much two sides of the same coin. . . . The biggest surprise of Dark Territory is the identity of the most prominent domestic heroes and villains in the “secret history.” . . . Dark Territory is the rare tome that leaves the reader feeling generally good about their civilian and military leadership.” ― The New York Times

“A book that grips, informs and alarms, finely researched and lucidly related.” -- John le Carré

“Comprehensively reported history . . . The book’s central question is how should we think about war, retaliation, and defense when our technologically advanced reliance on computers is also our greatest vulnerability?” ―
The New Yorker

Dark Territory captures the troubling but engrossing narrative of America’s struggle to both exploit the opportunities and defend against the risks of a new era of global cyber-insecurity. Assiduously and industriously reported. . . . Kaplan recapitulates one hack after another, building a portrait of bewildering systemic insecurity in the cyber domain. . . . One of the deep insights of Dark Territory is the historical understanding by both theorists and practitioners that cybersecurity is a dynamic game of offense and defense, each function oscillating in perpetual competition.” ― The Washington Post

Dark Territory offers thrilling insights into high-level politics, eccentric computer hackers and information warfare. In 15 chapters—some of them named after classified codenames and official (and unofficial) hacking exercises—Kaplan has encapsulated the past, present and future of cyber war. ― The Financial Express

“An important, disturbing, and gripping history arguing convincingly that, as of 2015, no defense exists against a resourceful cyberattack.” ―
Kirkus Reviews, starred review

“Kaplan dives into a topic which could end up being just as transformational to national security affairs as the nuclear age was. The book opens fast and builds from there, providing insights from research that even professionals directly involved in cyber operations will not have gleaned. . . . You will love this book.” -- Bob Gourley ―
CTOvision.com

“The best available history of the U.S. government’s secret use of both cyber spying, and efforts to use its computer prowess for more aggressive attacks. . . . Contains a number of fascinating, little-known stories about the National Security Agency and other secret units of the U.S. military and intelligence community. . . . An especially valuable addition to the debate.” -- John Sipher ―
Lawfare

“Fascinating . . . To understand how deeply we have drifted into legally and politically uncharted waters, read Kaplan’s new book,
Dark Territory: The Secret History of Cyber War.” -- George F. Will ― The Washington Post

"Fred Kaplan’s Dark Territory may become a classic reference for scholars and students seeking to understand the complicated people who ushered the United States into the cyber-conflict era and the tough decisions they made." -- Rear Admiral Grace Hopper, Director, Center for Cyber Conflict, US Naval War College ―
Proceedings of the U.S. Naval Institute

“Deeply sourced. Luckily, he’s not slavishly loyal to his sources.” ―
Pittsburgh Post-Gazette

EDITORS' CHOICE ―
New York Times Book Review

“Chilling . . . Kaplan is one of America’s leading writers on national security, and his accounts of cyberattacks are gripping . . . assiduously researched.” -- Edward Lucas ―
The Times (London)

“Peppered with many fascinating behind-the-scenes anecdotes . . . A readable and informative history.” -- P.W. Singer ―
The New York Times Book Review

A “Hot Type” Book Pick for March 2016 ―
Vanity Fair

A “Hot Tech Book of 2016” ―
Tech Republic

“Worthy of any spy thriller. . . a strong narrative flow . . . impressivelydetailed . . . deeplyrelevant . . . vital.” ―
The National (UAE)

“Jarring . . . a rich, behind-the-headlines history of our government’s efforts to make policy for the jaw-dropping vulnerabilities of our ever-increasing dependence on computers. . . . Kaplan renders a vivid account of the long struggle waged by presidents, bureaucrats, generals, private-sector CEOs, and privacy advocates . . . Kaplan enjoys considerable credibility in defense circles, but he guides us through the dark territory of cyber conflict with an omniscient-narrator voice reminiscent of Bob Woodward’s behind-the-scenes books. . . . Today, Kaplan argues, it is precisely U.S. pre-eminence in the network connectivity that makes us the most vulnerable target in the world to cyber sabotage.” ―
Washington Independent Review of Books

“Pulitzer-prizewinning journalist Fred Kaplan’s taut, urgent history traces the dual trajectory of digital surveillance and intervention, and high-level US policy from the 1980s on.” ―
NATURE

Dark Territory is a remarkable piece of reporting. Fred Kaplan has illuminated not merely the profound vulnerabilities of our nation to cyber warfare, but why it has taken so long for our policy-makers to translate indifference into concern and concern into action. This is a vitally important book by a meticulous journalist.” -- Ted Koppel, author of Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath

“A fascinating account of the people and organizations leading the way towards a cyber war future.” -- Dorothy E. Denning, author of Information Warfare and Security, 1st Inductee, National Cyber Security Hall of Fame

“A very in-depth work... its content is enlightening and intelligent and the secrets it uncovers are astounding.” ―
The News Hub

“Everyone has heard the term 'cyber warfare.' Very few people could explain exactly what it means and why it matters.
Dark Territory solves that problem with an account that is both fascinating and authoritative. Fred Kaplan has put the people, the technologies, the dramatic turning points, and the strategic and economic stakes together in a way no author has done before.” -- James Fallows, national correspondent, The Atlantic

“Chilling” ―
Haaretz

“Revealing. . . . On a vital current-events topic, the well-connected Kaplan’s well-sourced history gives readers much to ponder.” ―
Booklist

“One of the very best books ever written about the American military in the era of small wars . . . Fred Kaplan brings a formidable talent for writing intellectual history.” ―
The New York Review of Books

“Excellent . . . An intellectual thriller.” ―
Time

“Excellent . . . Poignant and timely . . . A good read, rich in texture and never less than wise.” ―
Foreign Policy

“The best account to date of the history of cyber war…a human story: a history as revealed by the people involved in shaping it…full of detail, including information that will be new even to insiders.” ―
The Times Literary Supplement

"It’s not easy to write an engaging book on cyberwar, and Kaplan, a national security columnist at Slate, has done an admirable job. He presents a clear account of the United States’ evolution into a formidable cyberpower, guiding the reader through a thicket of technical details and government acronyms." ―
Foreign Affairs

About the Author

Fred Kaplan is the national-security columnist for Slate and the author of five previous books, Dark Territory: The Secret History of Cyber War, The Insurgents: David Petraeus and the Plot to Change the American Way of War (a Pulitzer Prize finalist and New York Times bestseller), 1959, Daydream Believers, and The Wizards of Armageddon. He lives in Brooklyn with his wife, Brooke Gladstone.

Product details

  • Publisher ‏ : ‎ Simon & Schuster; Reprint edition (March 28, 2017)
  • Language ‏ : ‎ English
  • Paperback ‏ : ‎ 352 pages
  • ISBN-10 ‏ : ‎ 1476763267
  • ISBN-13 ‏ : ‎ 978-1476763262
  • Item Weight ‏ : ‎ 9.8 ounces
  • Dimensions ‏ : ‎ 5.5 x 1 x 8.38 inches
  • Customer Reviews:
    4.4 4.4 out of 5 stars 991 ratings

About the author

Follow authors to get new release updates, plus improved recommendations.
Fred M. Kaplan
Brief content visible, double tap to read full content.
Full content visible, double tap to read brief content.

Discover more of the author’s books, see similar authors, read author blogs and more

Customer reviews

4.4 out of 5 stars
4.4 out of 5
991 global ratings

Top reviews from the United States

Reviewed in the United States on June 27, 2016
In 1984, a young French engineer and his literary associate published a technology thriller titled Softwar. In the novel, a secretive US agency named the National Software Agency or NSA implants a smart bomb in a supercomputer exported by the French government for a meteorological station in the Soviet Union. The Russian officer investigating the case discovers that, when fed with a certain password, all Soviet computers equipped with US-manufactured components are turned down and destroyed, effectively paralyzing the public utilities, industries, and militaries that they are serving. Shortly after the publication, the young author received the visit of two men in black who wanted to know where he had gotten the idea for the novel. His explanation was simple. While teaching math at the Lycée Français de New York as part of his military service through cooperation, he had created a software-engineering company that sold computer programs to various clients in France and abroad. Some clients were bad payers, and so to recover his claims, he had inserted a smart bomb in the delivered software that could be activated by a simple telephone call through a modem. The Americans were quite impressed. Without any insider information, Thierry Breton—the young French entrepreneur, who later went on to become Minister of Finance and the CEO of a major IT company in his home country—had involuntarily set his foot on a secretive program very much similar to the one depicted in his book.

The 1984 novel is now but a distant memory in the mind of its readers, and Softwar isn’t even mentioned in Fred Kaplan’s book on “the secret history of cyber war.” But it is startling how our perception of cyber warfare—the adequate term that came to designate what the French novel had named “la guerre douce”—is shaped by the popular media. From the plane of technicians and operators up to the highest executive level, bestseller novels and popular movies alert us to new realities that are otherwise clouded in a shroud of secrecy—or dismissed as too technical. There is a wonderful episode in Dark Territory in which President Ronald Reagan, who liked to relax by watching Hollywood movies, sees the film War Games starring Matthew Broderick and then asks his top brass whether it was possible for a teenager like the one portrayed in the film by the young actor to hack into sensitive Pentagon computers. The answer—“yes, and it’s much worse than you think”—sets in motion a whole chain of events leading to the adoption of the first presidential directive on the topic of cyber war. Another popular production mentioned in the book is the movie called Sneakers, where Ben Kingsley involuntarily gives the NSA director his new mission statement in a prescient soliloquy (“The world is run by ones and zeroes… There’s a war out there… It’s about who controls the information.”). Yet another movie that had an impact on national policy was The Interview, the film that provoked the ire of the North Korean regime because it made ridicule of its leader. North Korea’s cyberattack on Sony Picture in retaliation for making the movie prompted the United States to declare it would “respond proportionally” to the attack “in a place and time and manner that we choose.”

There were many ways in which the book Softwar was prescient. It brought to the attention of the wide public notions that were yet to find a proper name—logic bombs, viruses and worms, malware, hacking, backdoors—while pointing to some of the security challenges that the computer age brought in its wake. The plot line’s plausibility was enhanced by references to the geopolitical context—Mikhail Gorbachev features as a character in the plot, at the time he was only a rising star in the Soviet Union’s party system. The book even introduces the NSA by its acronym, at a time the intelligence agency was so secretive that insiders joked that the initials stood for “No Such Agency.” Yet “softwar”, the term coined by the authors, didn’t stick: it reeked too much of soft power, and the militaries who handled the matter didn’t want to appear as soft. Instead, the word that imposed itself was the prefix “cyber”, as in cyberspace or cyberwar, cybercrime or cyberterrorism. It stemmed from William Gibson’s science-fiction novel, The Neuromancer, also dated 1984, that became a cult classic among computer specialists. Many hackers and counter-hackers were also inspired by Cliff Stoll’s 1989 book, The Cuckoo’s Egg, in which the author working as a systems administrator at the Lawrence Berkeley National Laboratory details the investigation that led to the capture of a East German hacker who had penetrated the system.

Written by a Pulitzer-winning journalist, Dark Territory demonstrates that cyber war is now firmly entrenched, not just in popular culture, but also in the US’s defense and security apparatus. While other analysts would focus on geopolitics or insist on the vulnerability of the American economy to attacks through cyberspace, Fred Kaplan chose to concentrate on the domestic scene and write a history of cyber warfare. He demonstrates that this history is not limited to the twenty-first century. In fact, the concern about computer security is almost as old as computers themselves. It predates by a few months the launch of ARPANET, the ancestor of the Internet designed by DARPA (then ARPA) to connect the computers of military scientists and researchers. It is altogether fitting that the author of the first paper on the topic later went on to advise the scenarists of the two movies mentioned earlier, War Games and Sneakers. The first cyber attacks, including the ones designed as military exercises to expose the security gaps of government systems, took the military and civilian establishments entirely off-guard. No guidelines had ever been issued, no chain of command drawn up. No one was in charge or even capable of fixing the problem. According to Fred Kaplan, and despite the many reports and action plans that have been written about the topic, we have made little progress since then.

Much of the story is about bureaucratic wrangling, office politics, inter-agency skirmishes, and administrative process. I have to confess I quickly lost track of all the expert working groups, administrative reports, blue-ribbon commissions, and presidential decrees that punctuated the way Washington dealt with the issue. Typically, each time a problem erupts, an expert group gathers and ultimately recommends that the president appoint a commission which, in turn, holds hearings and writes a report, which culminates in the drafting of another presidential directive. For somebody like me who knows how bureaucracies ‘work’, this can be rather frustrating. Yet even I was impressed by the skills exhibited by some players in the bureaucratic game. The officials who drafted directives and reports often concluded that a senior official position should be created and typically recommended the job should be theirs. An NSA director who was nominated as deputy director of the CIA sent memos to himself (from NSA head to CIA number two) in the six-week period when he held dual positions, thereby settling many of the scores between the two agencies and giving the NSA sole control of computer-based intelligence. I was also sensitized to the importance of getting the president’s attention time: on the rare occasions were presidents were briefed on cyber warfare, NSA directors typically strayed from their presentation on cyber attack to cover the much murkier ground of cyber protection, where no government agency had a clear mandate.

At several junctures in his narrative, Kaplan insists on the realization by decision makers that “what the United States was doing to its enemies, its enemies could also do to the United States.” Information warfare isn’t just about gaining an advantage in combat; it also has to be about protecting the nation from other countries’ effort to gain the same advantage. There is a extremely fine line between offense and defense in the cyber domain: Computer Network Attack and Computer Network Defense—CNA and CND—are two sides of the same coin. Administrative reports regularly pointed out the vulnerability of electrical power grids, oil and gas pipelines, dams, railroads, waterworks, and other pieces of a nation’s critical infrastructure. Some classified exercises simulated attacks on such civilian infrastructures, and the results were devastating. And yet nobody seemed willing to address the problem. The reason was simple: “private companies didn’t want to spend the money on cyber security, and they resisted all regulations to make them do so; meanwhile, federal agencies lacked the talent or resources to do the job, except for the NSA, which had neither the legal authority nor the desire.” In addition, government agencies had no incentive to help private companies patch the holes and “zero day” points of vulnerability they discovered in commercial computer programs: they used them as points of entry into the systems of foreign governments that bought the same software applications. The void was partly filled by private consulting firms, often staffed by former government officials, that made small fortunes by finding these holes and selling their discoveries to private companies and governments—or to spies and criminals.

It is on the side of Computer Network Attack, or cyberwar operations, that I found the book most revealing—but also the most frustrating, due to the inherent limitations on that kind of information. The least known details are disclosed on the earliest uses of computer warfare: how Saddam Hussein’s phone conversations with his generals were tapped during Operation Desert Storm after the fiber-optic network had been destroyed; how the US planned to turn off all radars and anti-aircraft batteries during its aborted 1994 invasion of Haiti through what is now called a denial of service attack; or when the NSA, along with the Pentagon and the CIA, spoofed the Serbian air-defense command by tapping into its communication lines and sending false data to its radar screens. Interestingly, these three episodes relied on the use of telecom networks—listening on conversations, flooding the entire phone system with busy signals, or hacking into telecommunication software to feed false information. By contrast, the wars in Afghanistan and Iraq and the fight against the insurgency exploited the full gamut of cyber capabilities. Owing to the dispatch of six thousand NSA officials in these theaters, the lag time between collecting and acting on intelligence was slashed from sixteen hours to one minute. Signals intercepted from the chips of cellphones allowed SIGINT teams to track the location and movements of enemy fighters even if their phones were turned off, thereby guiding drone strikes and ground attacks. Penetrating and probing the email and cell phone networks of Iraqi insurgents also allowed US operators to send them false messages that lead them to ambushes.

By contrast, the cyber operations waged by foreign powers get much less coverage. Russia’s cyber attacks on Estonia and on Georgia are only succinctly described, and Ukraine isn’t even mentioned. We don’t know who operates Russia’s hacker brigades: the general who answers a US delegation investigating the Moonlight Maze incident by putting the blame on “those motherf***s in intelligence” suddenly disappears from the scene. We get only minimal information on China’s PLA Unit 61398, whose deeds were partly uncovered in the 2013 report by Mendiant, a software-security firm. The role of Unit 8200, Israel’s cyber war bureau, in the development of stuxnet is not specified: we don’t know what specific contribution they made to this elaborate spy worm that paralyzed Iran’s nuclear enrichment facilities in 2010. We don’t learn about the cyberwar capabilities of European countries, and the Five Eyes intelligence-sharing agreement between Australia, Canada, New Zealand, the United Kingdom and the United States is mentioned only in passing. This is a secret history of cyber war written only from the US perspective. In an age when cyberspace knows no borders and every big nation competes to build their own cyberwar capabilities, this is a serious limitation in an otherwise well-informed and highly readable book.
6 people found this helpful
Report
Reviewed in the United States on February 22, 2024
A little older but a really good take on the cyber space since before it was called Cyberspace.
Reviewed in the United States on June 2, 2016
This book is amazing and scary at the same time. The world is changing at ever increasing rates. The pace is so fast I think most people don't realize it. This book will make you realize how fast things change. War itself is changing too. The book is about the emergence of cyber warfare. This new trend is relatively new. Most of it just in the past 15 years. All of it is recorded in the book. That alone will amaze you. That is only part of story here.

The book talks about both the emergence of the field from a meeting in the Reagan White House asking if the movie "War Games" could be real to today's events. You see how the program emerges from birth to defense to offensive operations. The reader will learn about scores of new information never reported anywhere else. That is a second reason to buy the book. Every page has these great stories. The story of the stuxnex virus is explained plus scores of others. The mysterious Israeli strike against the Syrian reactor is talked about. One interesting piece I learned is how the US was reading the insurgents emails in Iraq. The US then sent out inaccurate information back out to the insurgents to lead them to ambushes. Another story is how the US jammed up the Haiti air defense system through what is now called a denial of service attack.

The book also takes you behind the scenes from the gee whiz stuff to the bureaucratic wrangling. You learn about the debates and inter agency challenges connected to the idea. The internal debates about offensive cyber attacks was eye opening. Many felt it would open up Pandora's box upon the world.

The last chapter is real scary. The author chronicles a 2014 attack against the Sands Corporation by Iran because its majority stock holder said something on youtube that offended Iran. A virus destroyed thousands of computers and stole customer credit card numbers. The book could have listed scores of other similar stories, Target, Home Depot, OPM, etc.. and other now are fighting cyber warfare too. Pandora has definitely has been let out of the bottle.

The book
6 people found this helpful
Report

Top reviews from other countries

Translate all reviews to English
Slim
3.0 out of 5 stars Produto mal embalado. sujo e amassado
Reviewed in Brazil on May 21, 2021
Produto mal embalado. sujo e amassado
Customer image
Slim
3.0 out of 5 stars Produto mal embalado. sujo e amassado
Reviewed in Brazil on May 21, 2021
Produto mal embalado. sujo e amassado
Images in this review
Customer image Customer image Customer image Customer image
Customer imageCustomer imageCustomer imageCustomer image
Hannah Richta
5.0 out of 5 stars A “history perspective” on an increasingly important topic
Reviewed in Germany on May 11, 2021
Entertaining. Eye-opening. A good, non-technical read full of interesting anecdotes.
Cliente de Amazon
5.0 out of 5 stars buen regalo
Reviewed in Mexico on September 19, 2017
buen regalo buen tiempo de envió precio excelente, llego bien cuidado y a tiempo, no ha habido quejas hasta el momento y ya hasta compre mas libros y lo seguire haciendo.
Simple mind
4.0 out of 5 stars Interesting
Reviewed in Singapore on November 30, 2022
Hidden truth
Muthukrishnan Rajeshwaran
5.0 out of 5 stars Five Stars
Reviewed in India on March 16, 2017
Read it and understand the vulnerability of data privacy in the interconnected world we are in :)