• Complain

Worth Books - Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan

Here you can read online Worth Books - Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan full text of the book (entire story) in english for free. Download pdf and epub, get meaning, cover and reviews about this ebook. year: 2017, publisher: Worth Books, genre: Politics. Description of the work, (preface) as well as reviews are available. Best literature library LitArk.com created for fans of good reading and offers a wide selection of genres:

Romance novel Science fiction Adventure Detective Science History Home and family Prose Art Politics Computer Non-fiction Religion Business Children Humor

Choose a favorite category and find really read worthwhile books. Enjoy immersion in the world of imagination, feel the emotions of the characters or learn something new for yourself, make an fascinating discovery.

Worth Books Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan
  • Book:
    Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan
  • Author:
  • Publisher:
    Worth Books
  • Genre:
  • Year:
    2017
  • Rating:
    5 / 5
  • Favourites:
    Add to favourites
  • Your mark:
    • 100
    • 1
    • 2
    • 3
    • 4
    • 5

Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan: summary, description and annotation

We offer to read an annotation, description, summary or preface (depends on what the author of the book "Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan" wrote himself). If you haven't found the necessary information about the book — write in the comments, we will try to find it.

Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan — read online for free the complete book (whole text) full work

Below is the text of the book, divided by pages. System saving the place of the last page read, allows you to conveniently read the book "Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan" online for free, without having to search again every time where you left off. Put a bookmark, and you can go to the page where you finished reading at any time.

Light

Font size:

Reset

Interval:

Bookmark:

Make
Sign up for our newsletter to discover more ebooks worth reading EARLY - photo 1
Sign up for our newsletter to discover more ebooks worth reading.
EARLY BIRD BOOKS FRESH EBOOK DEALS DELIVERED DAILY LOVE TO READ LOVE GREAT - photo 2
EARLY BIRD BOOKS FRESH EBOOK DEALS DELIVERED DAILY LOVE TO READ LOVE GREAT - photo 3
EARLY BIRD BOOKS
FRESH EBOOK DEALS, DELIVERED DAILY
LOVE TO READ ?
LOVE GREAT SALES ?
GET FANTASTIC DEALS ON BESTSELLING EBOOKS DELIVERED TO YOUR INBOX EVERY DAY!
Summary and Analysis of Dark Territory The Secret History of Cyber War - photo 4
Summary and Analysis of
Dark Territory
The Secret History of Cyber War
Based on the Book by Fred Kaplan
The summary and analysis in this ebook are meant to complement your reading - photo 5
The summary and analysis in this ebook are meant to complement your reading experience and bring you closer to a great work of nonfiction. This ebook is not intended as a substitute for the work that it summarizes and analyzes, and it is not authorized, approved, licensed, or endorsed by the works author or publisher. Worth Books makes no representations or warranties with respect to the accuracy or completeness of the contents of this ebook.
Contents
Context
Dark Territory , a history of cyber warfare and US national security, was released at an apropos time. It was 2016, the middle of the contentious TrumpClinton presidential election, and hacking was at the forefront of the national conversation. Hillary Clintons use of a private email server had come under heavy criticism, and reports were beginning to emerge that the Democratic National Committees system had been hacked. Soon, an email dump of those private communications made revelations public that began to shift the electionand, some say, handed the surprising victory to Donald Trump.
Beyond politics, Dark Territory has expanded on a conversation already happening in boardrooms and corner offices around the world. Hacking has cost numerous corporations millions of dollars in ruined equipment and lost trade secrets, to say nothing of consumer confidence. This has in turn given rise to the massive and growing cyber-security industry, one whose actions remain as opaque as those of the hackers. Dark Territory sheds light on the dangers, risks, and rewards of cyber attacks in the age of total Internet connectivity.
Overview
Cyber warfare, or war waged over the Internet, is a global phenomenon. Dark Territory is a definitive account of its history, how it functions in our current age, and why it will continue to do so for many years to come. Tracing the secret history of US intelligence in the Internet age, author Fred Kaplan details how cyber warfare has evolved since the 1980s, revealing the major players, events, and technologies that have transformed the weapons of war from bombs and bullets to bits and bytes. From early cyber attacks in Kosovo that fooled radar operators into missing their targets to the fight to identify Russian hackers penetrating government systems, Dark Territory contains the history of espionage in the digital age.
Whistleblower Edward Snowden may have put the National Security Agency (NSA) into the spotlight, but the reality is that this organization has affected US and international policy for years, through secret operations, espionage, and counterintelligence operations. Cyber attacks have taken place at NSA headquarters and in Hollywood, in politics and publicity campaigns. Kaplan discusses recent attacks, such as Irans hack of the Las Vegas Sands Corporation, which caused millions of dollars of damages, and North Koreas attack on Sony Pictures, which had produced a movie highly critical of the regime.
Fred Kaplan takes the reader on a whirlwind journey through time and across the globe to explore how cyber warfare has altered the actual structure of war and peace, and how our reliance on data will ensure that cyber attacks continue to shape our world.
Summary
Chapter 1: Could Something Like This Really Happen?
In June of 1983, President Reagan first saw the Hollywood blockbuster WarGames . Watching a tech-whiz kid who inadvertently hacks into NORAD (North American Aerospace Defense Command) and nearly starts World War III made Reagan wonderjust how vulnerable was the United States to such an attack? The answer surprised him. A similar attack was possible. Immediately, he charged the NSA with securing all computer networks and servers in the country.
However, the order was short lived, as many viewed it as overreach. The issue largely disappeared until the Clinton administration, when the country was hit by several cyber attacks. Yet it wasnt until Barack Obamas presidency that the United States created its first Cyber Command, and, in a time of shrinking military budgets, funded it massively.
The precursor to the NSA was created during World War I. Early cyber warfare techniques focused on gathering SIGINT (signals intelligence) by listening to communications. Over the years, it developed electronic spying techniques, such as tapping into microwave broadcasts to determine what the Soviets and other potential adversaries were up to. The United States stuffed the tenth floor of its Moscow embassy with monitoring equipment. But the Russians, too, could play this game, and began employing similar tactics against the United States.
In the 1960s the Defense Department created ARPANET, a program under the Advanced Research Project Agency, which was tasked with researching futuristic military weapons. An inadvertent forerunner to the Internet, it had been established to help scientists and the military share research. This created security concerns regarding classified information. These worries were waved off with the assertion that it would take decades for Americas adversaries to be able to hack into the system. While this assumption was true, it fostered the creation of an unsecured network.
However, once technology made it possible to disable or destroy targets through a cyber attack, it dramatically escalated the risk and reward of cyber warfare.
Need to Know: A program created to help scientists share research invented what we know today as the Internetalso opening the door to cyber warfare and cyber attacks.
Chapter 2: Its All About the Information.
When Iraqi leader Saddam Hussein invaded Kuwait in 1990, President George H. W. Bush retaliated with Operation Desert Storm, quickly defeating the Iraqi army. The NSA facilitated this achievement, monitoring and disabling Iraqs communications so that the United States could avoid traps and emerge with minimal casualties. However, the military was reluctant to wage cyber warfare itself: Commanding general Norman Schwarzkopf refused to disable infrastructure electronically rather than blow it up, and Secretary of Defense Dick Cheney also preferred bombing to hacking. Because of their refusal, Iraqi civilians on the ground lost their lives.
Mike McConnell, head of the NSA in the early 1990s, knew about the power of hacking. But he was concerned about the possibility of voice encryption, and how it could render their existing phone surveillance methods impossible. To combat that threat, he wanted to install something called a Clipper Chip inside every phone. The complicated chip, which would have increased the cost of the phone to $1,000, was doomed from the start, especially since many doubted it was truly secure.
Next page
Light

Font size:

Reset

Interval:

Bookmark:

Make

Similar books «Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan»

Look at similar books to Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan. We have selected literature similar in name and meaning in the hope of providing readers with more options to find new, interesting, not yet read works.


Reviews about «Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan»

Discussion, reviews of the book Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan and just readers' own opinions. Leave your comments, write what you think about the work, its meaning or the main characters. Specify what exactly you liked and what you didn't like, and why you think so.