Dark Territory: The Secret History of Cyber WarSimon and Schuster, 2016 - 338 sivua “An important, disturbing, and gripping history” (Kirkus Reviews, starred review), the never-before-told story of the computer scientists and the NSA, Pentagon, and White House policymakers who invent and employ cyber wars—where every country can be a major power player and every hacker a mass destroyer. In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer security. From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role, Dark Territory chronicles a little-known past that shines an unsettling light on our future. Fred Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the “information warfare” squads of the military services, and the national security debates in the White House to reveal the details of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning—and (more often than people know) fighting—these wars for decades. “An eye-opening history of our government’s efforts to effectively manage our national security in the face of the largely open global communications network established by the World Wide Web….Dark Territory is a page-turner [and] consistently surprising” (The New York Times). |
Sisältö
Could Something Like This Really Happen? | 1 |
Its All About the Information | 21 |
A Cyber Pearl Harbor | 39 |
Eligible Receiver | 57 |
Solar Sunrise Moonlight Maze | 73 |
The Coordinator Meets Mudge | 89 |
Deny Exploit Corrupt Destroy | 107 |
Tailored Access | 119 |
The Whole Haystack | 191 |
Somebody Has Crossed the Rubicon | 203 |
Shady RATs | 221 |
The Five Guys Report | 237 |
Were Wandering in Dark Territory | 265 |
Afterword | 287 |
Notes | 293 |
Acknowledgments | 324 |
Muita painoksia - Näytä kaikki
Yleiset termit ja lausekkeet
activities agencies Air Force Alexander American analysts Army asked authority Bill Studeman briefing Bush called Center chief Chinese Clarke Clinton collect comes Command communications companies computer networks Court cyber attack decade defense Department deputy directive director documents earlier early executives foreign going hacked hackers Hayden idea information warfare inside intelligence intercept Internet interviews issue Joint June knew later lines March McConnell Meade meeting military monitoring months named Natanz national security needed networks Obama offensive officers once operations Pentagon President problem protect question Receiver Review Russian secret secretary seemed Senate SIGINT signals staff surveillance Team technical things threat tion told took turned United vulnerabilities wanted Washington weapons White House York