Your Memberships & Subscriptions
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
Dawn of the Code War: America's Battle Against Russia, China, and the Rising Global Cyber Threat Kindle Edition
With each passing year, the internet-linked attacks on America's interests have grown in both frequency and severity. Overmatched by our military, countries like North Korea, China, Iran, and Russia have found us vulnerable in cyberspace. The "Code War" is upon us.
In this dramatic book, former Assistant Attorney General John P. Carlin takes readers to the front lines of a global but little-understood fight as the Justice Department and the FBI chases down hackers, online terrorist recruiters, and spies. Today, as our entire economy goes digital, from banking to manufacturing to transportation, the potential targets for our enemies multiply. This firsthand account is both a remarkable untold story and a warning of dangers yet to come.
- LanguageEnglish
- PublisherPublicAffairs
- Publication dateOctober 16, 2018
- File size2818 KB
Editorial Reviews
Review
"This book is thrilling, important, and deeply fascinating. Cybersecurity is key to modern life: an imperative for us as a nation and each of us personally. It's about protecting our personal data, our businesses, and our democracy. John Carlin has been on the front lines, defending us against attacks from China, North Korea, Russia, Syria, and criminal gangs. The riveting stories of these secret battles for our digital safety teach us much about what America can-and must-do to protect itself."―Walter Isaacson, New York Times bestselling author of LeonardoDa Vinci
"By turns electrifying, illuminating, inspirational, and difficult to put down, [Dawn of the Code War] describes how 'criminals, terrorists, and spies' have used the Internet for their gain, and how the U.S. government along with international allies, has assessed and addressed these threats... Similar in energy to Carl Bernstein's All the Presidents Men, it informs of current cyberthreats while offering stirring success stories and cautions about the future of the code war... A deeply intriguing look into cybersecurity threats facing the United States that will fascinate anyone interested in technology and/or political intrigue." ―Library Journal
"Given the threats Carlin enumerates, including election hacking and the theft of intelligence files, responses "created and refined in real-time" are increasingly necessary-but not forthcoming. Given the lack of developed policy, if you're alarmed by the thought of Russian election tampering in 2016, you're likely to be even more so come the midterms-and by this dire book."―Kirkus Reviews
About the Author
John P. Carlin is the former Assistant Attorney General for National Security under Barack Obama, where he worked to protect the country against international and domestic terrorism, espionage, cyber, and other national security threats. A career federal prosecutor and graduate of Harvard Law School, John has spent much of the last decade working at the center of the nation's response to the rise of terrorism and cyber threats, including serving as National Coordinator of the Justice Department's Computer Hacking and Intellectual Property (CHIP) program, as an Assistant United States Attorney for the District of Columbia, and as chief of staff to then-FBI Director Robert Mueller. Today, Carlin is the global chair of the risk and crisis management practice for the law firm Morrison & Foerster. He is also chair of the Aspen Institute's Cybersecurity & Technology Program and a sought-after industry speaker on cyber issues as well as a CNBC contributor on cybersecurity and national security issues.
Garrett M. Graff is an award-winning journalist who has spent nearly a decade covering national security. He also serves as executive director of the Aspen Institute's Cybersecurity & Technology Program. A regular writer for WIRED, Bloomberg BusinessWeek, and a former editor of both Washingtonian and POLITICO Magazine, he has an extensive background in journalism and in technology. His oral history of Air Force One during 9/11 is under development as a movie by MGM and his April 2017 WIRED cover story about the FBI's hunt for an infamous Russian hacker has also been optioned for television. His most recent book is Raven Rock: The Story of the U.S. Government's Secret Plan to Save Itself-While the Rest of Us Die.
Product details
- ASIN : B079M8813N
- Publisher : PublicAffairs; Illustrated edition (October 16, 2018)
- Publication date : October 16, 2018
- Language : English
- File size : 2818 KB
- Text-to-Speech : Enabled
- Screen Reader : Supported
- Enhanced typesetting : Enabled
- X-Ray : Not Enabled
- Word Wise : Enabled
- Sticky notes : On Kindle Scribe
- Print length : 481 pages
- Best Sellers Rank: #2,055,003 in Kindle Store (See Top 100 in Kindle Store)
- #684 in Biographies of Espionage
- #723 in Online Safety & Piracy
- #1,056 in Conventional Weapons & Warfare History (Kindle Store)
- Customer Reviews:
About the author

Discover more of the author’s books, see similar authors, read author blogs and more
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonReviews with images
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
The book is an easy and engaging read, as Carlin gives an insider's view and walks the reader through the nuances of several major cyber attacks, including the actors, methods, and usually catastrophic results. It's a great recap and explanation of the terms that may have been heard in passing, such as Stuxnet, Mirai, Zeus, and the ever-present fake news. The book is conveniently broken down into chapters that address each principal nation-state threat – China, North Korea, Iran and Russia – and the similarities and differences in their methods and motivations.
The author gives some reasons for the low rate of prosecution of nation-state actors. He portrays the IC as a snarling dog on a leash being held by the diplomats and economic advisors who fear repercussions such as loss of access to China's market, fear for the safety of their employees, or simply fear the unknown. Some have even willingly traded their intellectual property in exchange for market access.
Carlin's main solutions to the problem of cyberthreats, naming and shaming and imposing sanctions, hinge on one of the most difficult aspects of prosecuting cybercrime – that of attribution, or being certain about whose fingers were on the keyboard when the attack occurred. He goes into some detail, explaining how each hacker's code has a recognizable style and how his team examines the "hop points", routers that the hackers use, that reveal their other activities and tie them to the crime as well as enlisting the help of private sector tech firms, such as Mandiant and other sources, like Human Intelligence, to correlate their suspicions.
Industry experts remain skeptical, however. The electronic packets that contain the malware, according to Bruce Schneier do not have reliable return addresses, and there's no way to tell if the computer that sent the package hasn't, itself, been hacked. Carlin trumpets the certainty with which the Sony hack can be attributed to North Korea. Other security professionals have reason to doubt. Sony has made many enemies among the hacker community. In 2005, Sony put DRM on their CDs, and they sued 17-year-old George Hotz and several others for hacking their Playstations. Anonymous struck Sony on their behalf, followed by LulzSec, who gained information from more than one million accounts, which they say was unencrypted and easy to find. Passwords were stored in plain text. Sony was an easy target and perceived as a bully by the hacker community. Thus, means, motive and opportunity.
Attribution is made even more difficult when politics are involved, and the Commander-in-Chief dismisses the integrity of IC intelligence, as is the case with the recent Russian attack on U.S elections. Senate Majority Leader Mitch McConnell, questioning the evidence that Russia was involved, and went as far as to accuse the IC of taking sides, saying, "You intelligence people shouldn't let yourself be used."
Carlin makes some other interesting points. While he notes the common observation that humans, being lazy, forgetful and distractible, will always be the weak link in the security chain, he observes that the hackers are human, too, and possess the same vulnerabilities. Another point is that, along with training users to be more aware of the threats, more cooperation is required between the government and private sectors. This may prove difficult, because, as Carlin states, "...of the nine or so agencies that exist to deal with cybersecurity, some want to help, but others want to punish." He postulates that as more cases are brought, more companies will realize that they are not alone, and there will be less stigma and embarrassment attached to the incidents.
In the long term, Carlin is holding out hope for a technologically innovative Moon shot solution, but in the meantime, along with the aforementioned sanctions, he states that better resilience is needed so that organizations are able to recover quickly when the inevitable breach occurs, and more thorough risk management determinations will help organizations prioritize assets. Also recommended are solutions such as Domain-based Message Authentication (DMARC) which makes domain spoofing impossible.
Despite the current, bleak cybersecurity climate, he remains optimistic. Given that he has a young daughter who stands to inherit our digital future, the alternative is too unpleasant to consider.
This is an important book that, all about five years old, it’s highly relevant to the challenge we face as our lives are more and more in twined with online services Starting in K-12, we need to focus on responsible online behavior and sound ethical training. We need a public who will demand far more from our elected officials in the code wars.
Sherill. S
Top reviews from other countries
Christian Brose, ”The Kill Chain”,2020を読んで、ごく簡単にだが、現代では「サイバー戦争」が新しい課題として問題化しつつある、との記述があったので、サイバー戦争、あるいはサイバーによる新しい脅威について知りたいと思い、アマゾンのホームぺージをじっくり探して、この本を選択した。”The Kill Chain”のときも同じだが、在野の無責任な学者や評論家の著作より、政府中枢に近いところで実務をあつかった人物の著作の方が得るところが多いのではないか、と考えて選択した結果である。
サイバーセキュリティーの問題は、インターネットが本格的に普及しはじめた1990年代ころからの高々30年間に急増し、リアル空間の戦争とは位相が異なるものの、新たな、アイマイな、複雑かつ深刻な脅威として存在している。
本書はサイバー脅威について、歴史の概要を紹介したうえで、著者John P. Carlinがオバマ政権時代の8年間にアメリカが実際に経験した事件を題材に、きわめて具体的・詳細に論述している。
サイバー攻撃の目的は、ターゲットに対して、カネを奪う、いやがらせを加える、高度技術・国家機密・企業秘密を盗む、文化・価値観を棄損する、リアル空間の戦争と組みあわせて攻撃力を高める、などきわめて多様である。サイバー空間の行為というヴァーチャルな事象だが、被害あるいは効果は甚大となり得る。
アメリカが具体的にサイバー脅威の敵と当面みなしているのは、中国・ロシア・イラン・北朝鮮の4か国と、非国家的存在としてのISILである。
中国は、アメリカにとってサイバー空間での最大の敵であり、とくに技術情報・企業機密などの窃盗は範囲も規模も莫大である。アメリカが資本と時間を投入して達成した先端技術を盗み、経済情報を盗み、コストフリーで自国の技術革新と経済成長の達成に邁進している。さらに軍事力の強化のために、アメリカの軍事技術・軍事機密も常に狙っている。そのうえアメリカ人の個人情報や富裕層の購買動向など、これまでスパイ活動の対象と想定できなかった範囲にまで活動を広げていて、不気味である。実行犯が逮捕され起訴されたときは訴訟過程の情報を盗んで、裁判を有利に進めようとするような、確信犯として行き届いた動きまである。中国共産党のもと人民解放軍が元締めとなって、国を挙げてリアル空間とともにサイバー空間でも組織的なスパイ活動を、あたかも国家ビジネスのように、ホワイトカラーの通常勤務の時間帯で遂行しているのが特徴である。中国は、巨大な購買力をバーゲイニング・パワーとして、アメリカ企業に対して圧力をかけるのに最大限活用している面もある。
ロシアは、旧ソ連以来の技術と人材の蓄積があり、サイバー攻撃の技術はもっとも進んでいる。アメリカなど西側世界の民主主義に鋭く対決するとともに、新しいマフィアのようにあらゆる犯罪をサイバー空間でしかけてくる。アメリカのみならず西側諸国の軍へのさまざまなサイバー攻撃も多い。アメリカ大統領選挙へのサイバー攻撃による干渉など、従来のサイバー攻撃に見られなかったような、アメリカの民主主義への不信感醸成を図るような行動もする。リアル空間での戦争に並行して、サイバー攻撃をかけて戦争を有利にすることも実行している。
イランは、アメリカとイスラエルに徹底的に敵対し、カネ・技術のみならずアメリカ社会の不安定化を狙って大胆なサイバー攻撃をしかけてくる。国内の反体制派に対するサイバー攻撃も多い。
シリアのシリア電子軍は、リアル空間の実際の戦争に並行してサイバー攻撃をする。シリア内の反体制派とは、サイバー空間でも対決と小競り合いが続いている。またアメリカのメディアのネットワークに侵入してフェイクニュースを流し、アメリカ社会を混乱させたこともある。
北朝鮮は、飢渇を免れようとカネを奪うことに熱心だが、ときに自国トップの権威・メンツの誇示のために、意外で特異なサイバー攻撃をしかけてくる。
ISILは、ホーム・グローン・テロリズムの宣伝と、ジハード戦士のリクルート活動が中心である。
われわれの日常生活は、広く深くインターネットに依存しているが、インターネットの通信網自身も、それに接続されるさまざまな要素も、すべて脆弱性を免れ得ず、サイバー脅威は根絶できる見込みはない。さらにサイバー犯罪は立証が容易でなく訴追に労力を要する。それでもリスクを正しく認識して正しく運用し、国家の諜報情報を併用・活用しながら、良心を維持する勢力が官民で協力して努力するならば、技術と法律とで抑制できる問題なのだ、と著者は自らの経験を踏まえて主張している。
私は、これまで日本に生活していて、この本に出てくるようなサイバー攻撃の存在をほとんど知らなかったので、ずいぶん参考にもなり、新たに知ることが多かった。しかしいずれ他人ごとでは済まなくなる時がくるのだろう。サイバー問題の最前線で活動していた著者の詳細で具体的な叙述は、とても迫力があり、興味深かった。
本としての文章は、論理的で整理されていて読みにくいわけではないが、単語が通常よりかなり難しい。いささか文章も長めで、私は読み進めるのに多少苦労した。

