Press enter after choosing selection

The Perfect Weapon : : War, Sabotage, and Fear in the Cyber age

Sanger, David E. Book - 2018 363.23 Sa, Adult Book / Nonfiction / Politics / Sanger, David E. 2 On Shelf No requests on this item Community Rating: 3.5 out of 5

Cover image for The perfect weapon : : war, sabotage, and fear in the cyber age

Sign in to request

Locations
Call Number: 363.23 Sa, Adult Book / Nonfiction / Politics / Sanger, David E.
On Shelf At: Downtown Library

Location & Checkout Length Call Number Checkout Length Item Status
Downtown 2nd Floor
4-week checkout
363.23 Sa 4-week checkout On Shelf
Downtown 2nd Floor
4-week checkout
363.23 Sa 4-week checkout On Shelf
Malletts Adult Books
4-week checkout
363.23 Sa 4-week checkout Due 04-28-2024
Westgate Adult Books
4-week checkout
Adult Book / Nonfiction / Politics / Sanger, David E. 4-week checkout Due 05-23-2024

From Russia, with love -- Original sins -- Pandora's inbox -- The hundred-dollar takedown -- Man in the middle -- The China rules -- The Kims strike back -- Putin's petri dish -- The fumble -- Warning from the Cotswolds -- The slow awakening -- Three crises in the valley -- Left of launch.
"In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world's powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict. The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes--from crippling infrastructure to sowing discord and doubt--cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents--Bush and Obama--drew first blood with Operation Olympic Games, which used malicious code to blow up Iran's nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump's first year, turned back on the US and its allies. The government was often paralyzed, unable to threaten the use of cyberweapons because America was so vulnerable to crippling attacks on its own networks of banks, utilities, and government agencies. Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger--who broke the story of Olympic Games in his previous book--reveals a world coming face-to-face with the perils of technological revolution. The Perfect Weapon is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target."--Dust jacket.

REVIEWS & SUMMARIES

Publishers Weekly Review
Summary / Annotation
Table of Contents
Fiction Profile
Excerpt
Author Notes

COMMUNITY REVIEWS

No community reviews. Write one below!

Cover image for The perfect weapon : : war, sabotage, and fear in the cyber age


PUBLISHED
New York : Crown Publishers, an imprint of the Crown Publishing Group, [2018]
Year Published: 2018
Description: xxiii, 357 pages ; 25 cm
Language: English
Format: Book

ISBN/STANDARD NUMBER
9780451497895
0451497899

SUBJECTS
Cyberterrorism.
Cyberterrorism -- Prevention.
Internet and international relations.
Technology and international relations.
Internet in espionage.
Cyberspace -- Political aspects.
Hacking -- Political aspects.
Cyberterrorism.
Cyberterrorism. -- Prevention.