• Complain

Fred Kaplan - Dark Territory: The Secret History of Cyber War

Here you can read online Fred Kaplan - Dark Territory: The Secret History of Cyber War full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2016, publisher: Simon & Schuster, genre: Computer / Science. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

No cover
  • Book:
    Dark Territory: The Secret History of Cyber War
  • Author:
  • Publisher:
    Simon & Schuster
  • Genre:
  • Year:
    2016
  • Rating:
    4 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 80
    • 1
    • 2
    • 3
    • 4
    • 5

Dark Territory: The Secret History of Cyber War: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Dark Territory: The Secret History of Cyber War" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

A book that grips, informs, and alarms, finely researched and lucidly related. John le Carr
As cyber-attacks dominate front-page news, as hackers join terrorists on the list of global threats, and as top generals warn of a coming cyber war, few books are more timely and enlightening than Dark Territory: The Secret History of Cyber War, by Slate columnist and Pulitzer Prizewinning journalist Fred Kaplan.
Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the information warfare squads of the military services, and the national security debates in the White House, to tell this never-before-told story of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planningand (more often than people know) fightingthese wars for decades.
From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria,...

Fred Kaplan: author's other books


Who wrote Dark Territory: The Secret History of Cyber War? Find out the surname, the name of the author of the book and a list of all author's works by series.

Dark Territory: The Secret History of Cyber War — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Dark Territory: The Secret History of Cyber War" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make

Thank you for downloading this Simon & Schuster eBook.


Join our mailing list and get updates on new releases, deals, bonus content and other great books from Simon & Schuster.

C LICK H ERE T O S IGN U P

or visit us online to sign up at
eBookNews.SimonandSchuster.com

We hope you enjoyed reading this Simon & Schuster eBook.


Join our mailing list and get updates on new releases, deals, bonus content and other great books from Simon & Schuster.

C LICK H ERE T O S IGN U P

or visit us online to sign up at
eBookNews.SimonandSchuster.com

ALSO BY FRED KAPLAN

The Insurgents: David Petraeus and the Plot to Change the American Way of War

1959: The Year Everything Changed

Daydream Believers: How a Few Grand Ideas Wrecked American Power

The Wizards of Armageddon

Dark Territory The Secret History of Cyber War - image 1
Dark Territory The Secret History of Cyber War - image 2

Dark Territory The Secret History of Cyber War - image 3

Simon & Schuster

1230 Avenue of the Americas

New York, NY 10020

www.SimonandSchuster.com

Copyright 2016 by Fred Kaplan

All rights reserved, including the right to reproduce this book or portions thereof in any form whatsoever. For information, address Simon & Schuster Subsidiary Rights Department, 1230 Avenue of the Americas, New York, NY 10020.

First Simon & Schuster hardcover edition March 2016

SIMON & SCHUSTER and colophon are registered trademarks of Simon & Schuster, Inc.

For information about special discounts for bulk purchases, please contact Simon & Schuster Special Sales at 1-866-506-1949 or .

The Simon & Schuster Speakers Bureau can bring authors to your live event. For more information or to book an event, contact the Simon & Schuster Speakers Bureau at 1-866-248-3049 or visit our website at www.simonspeakers.com.

Book design by Ellen R. Sasahara

Jacket design by Jackie Seow

Library of Congress Cataloging-in-Publication Data

Kaplan, Fred M. Dark territory : the secret history of cyber war / Fred Kaplan. New York, NY : Simon & Schuster, 2016. | Includes bibliographical references and index.

LCSH: CyberterrorismPreventionUnited StatesHistory. | BISAC:

TECHNOLOGY & ENGINEERING / Military Science. | COMPUTERS /

Security /

Viruses. | HISTORY / Military / General.

Classification: LCC HV6773.15.C97 K37 2016 | DDC 363.325dc23 LC record available at http://lccn.loc.gov/2015027335

ISBN 978-1-4767-6325-5

ISBN 978-1-4767-6327-9 (ebook)

for Brooke Gladstone

CONTENTS
CHAPTER 1

COULD SOMETHING LIKE THIS REALLY HAPPEN?

I T was Saturday, June 4, 1983, and President Ronald Reagan spent the day at Camp David, relaxing, reading some papers, then, after dinner, settling in, as he often did, to watch a movie. That nights feature was WarGames , starring Matthew Broderick as a tech-whiz teenager who unwittingly hacks into the main computer at NORAD, the North American Aerospace Defense Command, and, thinking that hes playing a new computer game, nearly triggers World War III.

The following Wednesday morning, back in the White House, Reagan met with the secretaries of state, defense, and treasury, his national security staff, the chairman of the Joint Chiefs of Staff, and sixteen prominent members of Congress, to discuss a new type of nuclear missile and the prospect of arms talks with the Russians. But he couldnt get that movie out of his mind. At one point, he put down his index cards and asked if anyone else had seen it. Nobody had (it had just opened in theaters the previous Friday), so he launched into a detailed summary of its plot. Some of the legislators looked around the room with suppressed smiles or arched eyebrows. Not quite three months earlier, Reagan had delivered his Star Wars speech, calling on scientists to develop laser weapons that, in the event of war, could shoot down Soviet nuclear missiles as they darted toward America. The idea was widely dismissed as nutty. What was the old man up to now?

After finishing his synopsis, Reagan turned to General John Vessey, the chairman of the Joint Chiefs, the U.S. militarys top officer, and asked, Could something like this really happen? Could someone break into our most sensitive computers?

Vessey, whod grown accustomed to such queries, said he would look into it.

One week later, the general came back to the White House with his answer. WarGames , it turned out, wasnt at all far-fetched. Mr. President, he said, the problem is much worse than you think.

Reagans question set off a string of interagency memos, working groups, studies, and meetings, which culminated, fifteen months later, in a confidential national security decision directive, NSDD-145, signed September 17, 1984, titled National Policy on Telecommunications and Automated Information Systems Security.

It was a prescient document. The first laptop computers had barely hit the market, the first public Internet providers wouldnt come online for another few years. Yet the authors of NSDD-145 noted that these new deviceswhich government agencies and high-tech industries had started buying at a rapid clipwere highly susceptible to interception, unauthorized electronic access, and related forms of technical exploitation. Hostile foreign intelligence agencies were extensively hacking into these services already, and terrorist groups and criminal elements had the ability to do so as well.

This sequence of eventsReagans oddball question to General Vessey, followed by a pathbreaking policy documentmarked the first time that an American president, or a White House directive, discussed what would come to be called cyber warfare.

The commotion, for now, was short-lived. NSDD-145 placed the National Security Agency in charge of securing all computer servers and networks in the United States, and, for many, that went too far. The NSA was Americas largest and most secretive intelligence agency. (Insiders joked that the initials stood for No Such Agency.) Established in 1952 to intercept foreign communications, it was expressly forbidden from spying on Americans. Civil liberties advocates in Congress were not about to let a presidential decree blur this distinction.

And so the issue vanished, at least in the realm of high-level politics. When it reemerged a dozen years later, after a spate of actual cyber intrusions during Bill Clintons presidency, enough time had passed that the senior officials of the daywho didnt remember, if theyd ever known of, NSDD-145were shocked by the nations seemingly sudden vulnerability to this seemingly brand-new threat.

When the White House again changed hands (and political parties) with the election of George W. Bush, the issue receded once more, at least to the public eye, especially after the terrorist attacks of September 11, 2001, which killed three thousand Americans. Few cared about hypothetical cyber wars when the nation was charging into real ones with bullets and bombs.

But behind closed doors, the Bush administration was weaving cyber war techniques with conventional war plans, and so were the military establishments of several other nations, friendly and otherwise, as the Internet spread to the globes far-flung corners. Cyber war emerged as a mutual threat and opportunity, a tool of espionage and a weapon of war, that foes could use to hurt America and that America could use to hurt its foes.

During Barack Obamas presidency, cyber warfare took off, emerging as one of the few sectors of the defense budget that soared while others stayed stagnant or declined. In 2009, Obamas first secretary of defense, Robert Gates, a holdover from the Bush years, created a dedicated Cyber Command. In its first three years, the commands annual budget tripled, from $2.7 billion to $7 billion (plus another $7 billion for cyber activities in the military services, all told), while the ranks of its cyber attack teams swelled from 900 personnel to 4,000, with 14,000 foreseen by the end of the decade.

Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Dark Territory: The Secret History of Cyber War»

Look at similar books to Dark Territory: The Secret History of Cyber War. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Dark Territory: The Secret History of Cyber War»

Discussion, reviews of the book Dark Territory: The Secret History of Cyber War and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.