Enjoy fast, free delivery, exclusive deals, and award-winning movies & TV shows with Prime
Try Prime
and start saving today with fast, free delivery
Amazon Prime includes:
Fast, FREE Delivery is available to Prime members. To join, select "Try Amazon Prime and start saving today with Fast, FREE Delivery" below the Add to Cart button.
Amazon Prime members enjoy:- Cardmembers earn 5% Back at Amazon.com with a Prime Credit Card.
- Unlimited Free Two-Day Delivery
- Streaming of thousands of movies and TV shows with limited ads on Prime Video.
- A Kindle book to borrow for free each month - with no due dates
- Listen to over 2 million songs and hundreds of playlists
- Unlimited photo storage with anywhere access
Important: Your credit card will NOT be charged when you start your free trial or if you cancel during the trial period. If you're happy with Amazon Prime, do nothing. At the end of the free trial, your membership will automatically upgrade to a monthly membership.
Buy new:
$16.99$16.99
FREE delivery: Wednesday, April 24 on orders over $35.00 shipped by Amazon.
Ships from: Amazon.com Sold by: Amazon.com
Buy used: $9.02
Download the free Kindle app and start reading Kindle books instantly on your smartphone, tablet, or computer - no Kindle device required.
Read instantly on your browser with Kindle for Web.
Using your mobile phone camera - scan the code below and download the Kindle app.
@War: The Rise of the Military-Internet Complex Paperback – November 3, 2015
Purchase options and add-ons
“Scary but well documented . . . A deep dive into the world of cyber war and cyber warriors.” — Los Angeles Times
“Unsettling . . . A deeply informative account of how corporations, governments, and even individuals are rapidly perfecting the ability to monitor and sabotage the Internet infrastructure.” — Christian Science Monitor
The wars of the future are already being fought today. The United States military currently views cyberspace as the “fifth domain” of warfare (alongside land, air, sea, and space), and the Department of Defense, the National Security Agency, and the CIA all field teams of hackers who can, and do, launch computer virus strikes against enemy targets. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information, and the military has also formed a new alliance with tech and finance companies to patrol cyberspace. Shane Harris offers a deeper glimpse into this partnership than we have ever seen before, and he explains what the new cyber security regime means for all of us who spend our daily lives bound to the Internet—and are vulnerable to its dangers.
“@War is superb . . . Rigorous, comprehensive, and a joy to read.” — Lawfare
- Print length288 pages
- LanguageEnglish
- Publication dateNovember 3, 2015
- Dimensions5.31 x 0.75 x 8 inches
- ISBN-100544570286
- ISBN-13978-0544570283
The Amazon Book Review
Book recommendations, author interviews, editors' picks, and more. Read it now
Frequently bought together

Customers who viewed this item also viewed
Editorial Reviews
Review
Washington Post "Chilling . . . Extraordinary and urgent." Christian Science Monitor "Unsettling . . . Deeply informative." James Risen, author of Pay Any Price: Greed, Power, and Endless War “@War is a remarkable achievement. Harris uses dogged shoe-leather reporting to take us deep inside the government’s surveillance and cyber operations to give an unsparing look at what the NSA and other agencies are really doing with all our data. In the age of abstract Snowden documents, @War actually introduces us to the people running America’s electronic spying machine, and offers invaluable insights into how their ambition and turf battles impact our financial security, our privacy, and our freedom.” Thomas E. Ricks, author of Fiasco and The Generals “A great overview of our new cyberfronts. Unlike most books about cyberwar, this one is enjoyably readable. At times it feels like a modern spy novel, but it is a guide to tomorrow’s headlines.” Peter Bergen, author of Manhunt: The Ten-Year Search for Bin Laden from 9/11 to Abbottabad “@War is a tour de force of reporting on the past, present, and future of cyber-conflict. It will be required reading both in the Pentagon and among the army of Chinese cyber spies now assaulting American businesses. Hackers, policy makers, and others will find this book both intriguing and alarming; not to mention very well written.” Publishers Weekly "Cyber-espionage is the 'single most productive means of gathering information about our country’s adversaries,' writes Harris (The Watchers: The Rise of America’s Surveillance State), senior writer for Foreign Policy, in this unnerving exposé. After 9/11, the National Security Administration (NSA), the nation’s global information-gathering agency, submitted a wish list to the Bush administration. It was approved and the “'military-Internet complex was born.' According to Harris, electronic eavesdropping was fundamental to 2007’s Iraq surge and the NSA located Osama bin Laden through spyware planted in his operatives’ mobile phones. Readers will squirm as they learn how every communications enterprise (Google, AT&T, Verizon, Facebook) cooperates with the national security establishment. Harris delivers a convincing account of the terrible cyberdisasters that loom, and the intrusive nature of the fight to prevent them." Kirkus Reviews "Sprawling account of how the U.S. military joined forces with the National Security Agency to develop 'cyber warfare' capabilities, monitoring America's enemies and its citizens alike. Harris adeptly documents the online threats directed at American society, ranging from the Chinese military's well-funded hacking cells to large-scale information thefts committed by international crime syndicates, but he also demonstrates the NSA's insatiable collection of metadata and preparation of "backdoor" cyberweapons for future use, concluding that '[a]nonymity and collective security may be incompatible in cyberspace.'" —
From the Back Cover
“Unsettling . . . A deeply informative account of how corporations, governments, and even individuals are rapidly perfecting the ability to monitor and sabotage the Internet infrastructure.” — Christian Science Monitor
The wars of the future are already being fought today. The United States military currently views cyberspace as the “fifth domain” of warfare (alongside land, air, sea, and space), and the Department of Defense, the National Security Agency, and the CIA all field teams of hackers who can, and do, launch computer virus strikes against enemy targets. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information, and the military has also formed a new alliance with tech and finance companies to patrol cyberspace. Shane Harris offers a deeper glimpse into this partnership than we have ever seen before, and he explains what the new cyber security regime means for all of us who spend our daily lives bound to the Internet—and are vulnerable to its dangers.
“@War is superb . . . Rigorous, comprehensive, and a joy to read.” — Lawfare
SHANE HARRIS is a senior correspondent at the Daily Beast, covering national security, intelligence, and cyber security. He is also an ASU fellow at New America, where he researches the future of war. His work has appeared in the New York Times, the Wall Street Journal,Foreign Policy, and elsewhere. His first book, The Watchers: The Rise of America’s Surveillance State, was named one of the best books of 2010 by the Economist.
About the Author
Excerpt. © Reprinted by permission. All rights reserved.
The First Cyber War
Bob Stasio never planned to become a cyber warrior. After he graduated high school, Stasio enrolled at the University at Buffalo and entered the ROTC program. He majored in mathematical physics, studying mind-bending theories of quantum mechanics and partial differential equations. The university, eager to graduate students steeped in the hard sciences, waived the major components of his core curriculum requirements, including English. Stasio never wrote a paper in his entire college career.
Stasio arrived at Fort Lewis, Washington, in 2004, when he was twenty-two years old. His new brigade intelligence officer took one look at the second lieutenant’s résumé, saw the background in math and physics, and told Stasio, “You’re going to the SIGINT platoon.”
SIGINT, or signals intelligence, is the capture and analysis of electronic communications. Like all branches of intelligence, it’s a blend of science and art, but it’s heavy on the science. The brigade intelligence officer had worked at the National Security Agency and recognized that Stasio’s physics training would come in handy, because so much of SIGINT involves the technical collection of radio signals, fiber-optic transmissions, and Internet packets.
Stasio’s military training in college focused on how to use a rifle and lead a squad. But he had spent six months learning the basics of intelligence gathering and analysis at the army’s intelligence school at Fort Huachuca, Arizona. When he came to Fort Lewis, Stasio was assigned to a Stryker brigade, a mechanized force designed to be light on its feet, capable of deploying into combat in just a few days. It was Stasio’s job to locate the enemy on the battlefield by tracking his communications signals. And he was also supposed to divine his adversary’s intentions by eavesdropping on the orders a commander gave to troops, or listening for the air strike that a platoon leader was calling in from behind the lines. Stasio would join the Fourth Brigade, Second Infantry Division, “the Raiders,” and deploy to Iraq. He’d be working with a team of linguists, who would be essential, since Stasio didn’t speak Arabic. But when it came time to meet them, Stasio started to worry: nearly all of the linguists spoke only English and Korean.
The army had designed its signals intelligence system for the Cold War. Thousands of troops still served on the Korean Peninsula. They were still trained in how to fight a land battle with North Korean forces, in which the physics of SIGINT—locating tanks and troops—would be central to the mission. But the Raiders were going off to fight a network of Iraqi insurgents, volunteer jihadists, and terrorists. These guys didn’t drive tanks. They didn’t organize themselves according to a military hierarchy. And of course, they didn’t speak Korean.
Stasio decided that his intelligence training would be mostly useless in Iraq, where the US occupation was coming unglued. Army casualties were mounting, the result of a well-orchestrated campaign of roadside bombings by insurgents. The soldiers who didn’t die in these attacks were coming home with limbs missing, or with severe brain injuries that would impair them physically and emotionally for the rest of their lives. SIGINT wasn’t preventing these attacks. Indeed, it was hardly being used at all. In October 2004 the military’s top signals intelligence officer estimated that as much as 90 percent of all information in Iraq was being supplied by a network of human spies and informants—and they weren’t helping the Americans reduce the bombing attacks and insurgent strikes.
Stasio read as much as he could about insurgencies, noting in particular how they organized themselves using a network model, with many independent nodes of people working in teams, separate from a central controller. This was the opposite design of a vertical, military bureaucracy, with orders filtering down from the top through several layers of officers. In principle, the intelligence discipline in which Stasio was trained should still work. He was expected to locate his enemy using electronic signals and figure out his next move. But the tools the army had supplied to do this were ill suited to the shadowy, urban battlefields of Iraq. The Raiders used a collection “platform” known as the Prophet system, a rugged truck affixed with a tall, roof-mounted radio antenna about the size of a streetlamp. The older officers in the brigade liked the Prophet because it told them what enemy forces were in their immediate area of operations. It was a tactical device, and they controlled it, driving it to wherever they wanted to collect intelligence.
But the Prophet was designed to collect radio waves, and on a wide-open and relatively flat area of battle. Stasio knew that the enemy fighters in Iraq were communicating using cell phones and e-mail and through videos they’d posted on the Internet. They were moving in small groups through the dense concrete maze of Baghdad and other crowded Iraqi cities. The Prophet wasn’t the most useful tool. Indeed, when Stasio finally got to Iraq, he saw that the military intelligence units that had come before him were using the Prophet not to collect signals but to transport food and other supplies around the base.
There was another reason the old-timers liked the Prophet—it was theirs. They could drive it wherever they wanted. They had control over the collection and analysis of intelligence. Stasio thought that his more senior officers generally distrusted intel that came from back in the States, frequently from Washington, DC, and the national intelligence agencies such as the CIA and the NSA, which, from the battlefield, looked like big, lumbering bureaucracies filled with software engineers and computer geeks who were too removed from the on-the-ground tactical needs of forces in Iraq.
But Stasio knew the national agencies, and in particular the NSA, had something he needed: data. Namely, servers full of electronic communications and signals collected by the agency’s listening posts around the world. Stasio thought that if he could tap into SIGINT from Iraq, he might be able to understand something about the size and shape of the insurgent networks by piecing together their communications records. This was painstaking work, and it would require hours sitting in front of a computer, probably in some air-conditioned trailer, not driving a Prophet through dusty streets. Stasio was a fan of the HBO series The Wire, and he was particularly fond of one character, Lester, who uncovers a network of drug dealers in Baltimore by tracking their cell phone calls. Stasio wanted to do the same thing in Iraq.
He pleaded with his brigade intelligence officer at Fort Lewis: instead of sending him out to the rifle range to practice infantry techniques and study the bulky Prophet, let him and a few of his fellow intelligence officers spend time in the state-of-the-art intelligence facility on the base, learning how to use software for diagramming networks and digesting Internet and cell phone traffic. These tools had been largely overlooked by tactical military intelligence units, Stasio argued. But they could be enormously helpful in Iraq.
The officer agreed.
Stasio and a fellow lieutenant devised their own training regimen, which hinged on a concept called “reachback.” The idea was that in the field, small military intelligence units would set up their own computers and local networks, but they would reach back to the massive databases at the NSA and other agencies that were collecting useful intel from across the entire spectrum of military and intelligence operations, including satellite images, tips from informants, summaries of interrogations of captured fighters, even political forecasts produced by CIA analysts. To Stasio, no single piece of data was insignificant. But a single piece on its own was of little use. The information had to be “fused” into a nuanced picture.
For someone who grew up using many different modes of communication—phone, e-mail, text messaging—on many different devices, this method of intelligence analysis was intuitive. Stasio and the members of his platoon trained for two and a half years before they finally headed out to Iraq. He took four of the Korean linguists in his platoon and sent them to a one-year crash course in Arabic. He didn’t need them to be fluent, but with some language proficiency they could work with local translators to write intelligence reports. The rest of the linguists he sent to learn intelligence analysis.
Stasio arrived in Iraq in April 2007—without the Prophet in tow—as part of a new “surge” of American troops. He might have wondered if they arrived too late. Stasio and his team found US forces under relentless assault from insurgents, roadside bombers, and mortar attacks. Iraq was collapsing amid an escalating civil war. Foreign fighters were pouring into the country from neighboring Syria and Iran, and a ruthless terrorist network, known as al-Qaeda in Iraq, ran a brutal campaign of attacks against US and coalition forces, the Iraqi government, and Iraqi Shiites—fellow Muslims and innocent civilians. The terror group aimed to break the back of the fledgling government with a theocratic dictatorship. Maybe, Stasio thought to himself, I should have spent more time learning to fire my rifle.
But he didn’t know—couldn’t have known—that his ideas about intelligence-supported warfare were about to be tested on a massive scale. US forces were going to attack their enemy in a way they’d never attempted. And Stasio would be on the frontlines.
Product details
- Publisher : Eamon Dolan/Mariner Books; Reprint edition (November 3, 2015)
- Language : English
- Paperback : 288 pages
- ISBN-10 : 0544570286
- ISBN-13 : 978-0544570283
- Item Weight : 8.8 ounces
- Dimensions : 5.31 x 0.75 x 8 inches
- Best Sellers Rank: #487,106 in Books (See Top 100 in Books)
- Customer Reviews:
About the author

Shane Harris writes about intelligence and national security for The Washington Post. A Pulitzer Prize finalist, he is the author of two books and has been a staff writer at The Wall Street Journal, The Daily Beast, Foreign Policy, and National Journal. Shane is a recipient of the Gerald R. Ford Prize for Distinguished Reporting on National Defense and the Helen Bernstein Book Award for Excellence in Journalism. He is a regular commentator on MSNBC, CNN, NPR, the BBC, and other news organizations. He lives in Washington, DC.
Customer reviews
Customer Reviews, including Product Star Ratings help customers to learn more about the product and decide whether it is the right product for them.
To calculate the overall star rating and percentage breakdown by star, we don’t use a simple average. Instead, our system considers things like how recent a review is and if the reviewer bought the item on Amazon. It also analyzed reviews to verify trustworthiness.
Learn more how customers reviews work on AmazonReviews with images
-
Top reviews
Top reviews from the United States
There was a problem filtering reviews right now. Please try again later.
I will say there are times where he seems repetitive, but he does elaborate and go more in depth for the most part when he does repeat.
@WAR opens with a top-level meeting of government and private stakeholders, those entities who could be affected by a cyber attack. They where told of the emerging cyber threat. At that time, very little was known about cyber threats, let alone the scope of the threats. So not surprisingly, the invitees came away from their meeting shocked and completely surprised that our very existence was under attack by bad guys with desktop computers and an Internet connection. And the threat was growing at an accelerated pace, fueled by the breakthrough advancements in computer technologies, high-speed processors, more memory, fiber optic cables, just to name a few. Experts predicted that in the near future, cyber war would dominate the war theaters. Indeed, in 2012 the US former defense secretary, Leon Panetta referred to the growing cyber threat as, “Cyber Pearl Harbor.”
The term Cyber Pearl Harbor was coined with the obvious purpose to jolt the audience into the realization that cyberwar was serious business, grave and immediate. Something had to be done. Cyber Pearl Harbor then led to the category, “Fifth Domain of Warfare.” Placing Cyber Warfare, referred to as Information, on the list along with the other four domains of warfare:
Land
Sea
Air
Space
Information
Each chapter of the book is filled with interesting stories. After the the Fifth Domain of Warfare the author addresses the topic of the NSA’s monitoring inside the United States. That was an eyebrow-lifting discussion. Imagine every single phone conversation and electronic communication being recorded. Another story discusses how the Chinese stole huge amounts of information about our high-tech, stealth F-35 strike fighter; the most advanced jet fighter design in the world. In other words, our most secrete of secrets were silently sucked away through wiretaps, satellites and undersea cables using a cryptographic hash of zeros and ones. The book's chapters are also loaded with an abundance of computer terms and phrases. War Driving, rogue access points, bots and digital backdoors, are only a few examples. To get the most enjoyment out of this book, you probably should have some knowledge of these terms and phrases.
Finally, from Cyber Pearl Harbor to Dan Coates’ recent warning that we are still under cyber attack, @WAR connects the complex of dots so that we all may understand the cyber threat facing our nation, what it is, where it came from and how to deal with it. I found the book interesting and a bit scary. In the end, however, absolutely no doubt is left that Cyber Warfare has become a threatening reality that potentially affects every American, maybe even every person on the planet. I enjoyed the book and have no trouble giving @WAR a five stars recommendation.
Top reviews from other countries
It is long, so long... It tries to make its point like a novel, with lenghty and overall useless details such as the name of restaurant where this former spy met that journalist etc. etc.
You can skip many pages to get to the point...





