The perfect weapon: war, sabotage, and fear in the cyber age
"In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Wit...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
New York
Crown Publishers
[2018]
|
Ausgabe: | First edition |
Schlagworte: | |
Zusammenfassung: | "In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world's powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict. The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes--from crippling infrastructure to sowing discord and doubt--cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents--Bush and Obama--drew first blood with Operation Olympic Games, which used malicious code to blow up Iran's nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump's first year, turned back on the US and its allies. The government was often paralyzed, unable to threaten the use of cyberweapons because America was so vulnerable to crippling attacks on its own networks of banks, utilities, and government agencies. Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger--who broke the story of Olympic Games in his previous book--reveals a world coming face-to-face with the perils of technological revolution. The Perfect Weapon is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target."--Dust jacket |
Beschreibung: | xxiii, 357 Seiten 25 cm |
ISBN: | 9780451497895 9781911617723 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045077273 | ||
003 | DE-604 | ||
005 | 20180820 | ||
007 | t | ||
008 | 180706s2018 b||| 00||| eng d | ||
020 | |a 9780451497895 |c hardback |9 978-0-4514-9789-5 | ||
020 | |a 9781911617723 |c (pb) |9 978-1-9116-1772-3 | ||
035 | |a (OCoLC)1045926871 | ||
035 | |a (DE-599)BVBBV045077273 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-12 | ||
100 | 1 | |a Sanger, David E. |e Verfasser |0 (DE-588)1163849723 |4 aut | |
245 | 1 | 0 | |a The perfect weapon |b war, sabotage, and fear in the cyber age |c David E. Sanger |
246 | 1 | 0 | |a War, sabotage, and fear in the cyber age |
250 | |a First edition | ||
264 | 1 | |a New York |b Crown Publishers |c [2018] | |
264 | 4 | |c © 2018 | |
300 | |a xxiii, 357 Seiten |c 25 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
505 | 8 | |a From Russia, with love -- Original sins -- Pandora's inbox -- The hundred-dollar takedown -- Man in the middle -- The China rules -- The Kims strike back -- Putin's petri dish -- The fumble -- Warning from the Cotswolds -- The slow awakening -- Three crises in the valley -- Left of launch | |
520 | 3 | |a "In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world's powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict. The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. | |
520 | 3 | |a Cheap to acquire, easy to deny, and usable for a variety of malicious purposes--from crippling infrastructure to sowing discord and doubt--cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents--Bush and Obama--drew first blood with Operation Olympic Games, which used malicious code to blow up Iran's nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump's first year, turned back on the US and its allies. The government was often paralyzed, unable to threaten the use of cyberweapons because America was so vulnerable to crippling attacks on its own networks of banks, utilities, and government agencies. | |
520 | 3 | |a Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger--who broke the story of Olympic Games in his previous book--reveals a world coming face-to-face with the perils of technological revolution. The Perfect Weapon is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target."--Dust jacket | |
546 | |a Text in English | ||
650 | 0 | 7 | |a Geopolitik |0 (DE-588)4156741-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Information warfare |0 (DE-588)4461975-3 |2 gnd |9 rswk-swf |
653 | 0 | |a Cyberterrorism | |
653 | 0 | |a Cyberterrorism / Prevention | |
653 | 0 | |a Internet and international relations | |
653 | 0 | |a Technology and international relations | |
653 | 0 | |a Internet in espionage | |
653 | 0 | |a Cyberspace / Political aspects | |
653 | 0 | |a Hacking / Political aspects | |
653 | 0 | |a Cyberterrorism | |
653 | 0 | |a Cyberterrorism / Prevention | |
689 | 0 | 0 | |a Information warfare |0 (DE-588)4461975-3 |D s |
689 | 0 | 1 | |a Geopolitik |0 (DE-588)4156741-9 |D s |
689 | 0 | |5 DE-604 | |
940 | 1 | |n oe | |
999 | |a oai:aleph.bib-bvb.de:BVB01-030468321 | ||
942 | 1 | 1 | |c 609 |e 22/bsb |f 090512 |g 181 |
942 | 1 | 1 | |c 909 |e 22/bsb |f 090512 |g 181 |
Datensatz im Suchindex
_version_ | 1804178689329463296 |
---|---|
any_adam_object | |
author | Sanger, David E. |
author_GND | (DE-588)1163849723 |
author_facet | Sanger, David E. |
author_role | aut |
author_sort | Sanger, David E. |
author_variant | d e s de des |
building | Verbundindex |
bvnumber | BV045077273 |
contents | From Russia, with love -- Original sins -- Pandora's inbox -- The hundred-dollar takedown -- Man in the middle -- The China rules -- The Kims strike back -- Putin's petri dish -- The fumble -- Warning from the Cotswolds -- The slow awakening -- Three crises in the valley -- Left of launch |
ctrlnum | (OCoLC)1045926871 (DE-599)BVBBV045077273 |
edition | First edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04328nam a2200565 c 4500</leader><controlfield tag="001">BV045077273</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20180820 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180706s2018 b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780451497895</subfield><subfield code="c">hardback</subfield><subfield code="9">978-0-4514-9789-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781911617723</subfield><subfield code="c">(pb)</subfield><subfield code="9">978-1-9116-1772-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1045926871</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045077273</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-12</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Sanger, David E.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1163849723</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">The perfect weapon</subfield><subfield code="b">war, sabotage, and fear in the cyber age</subfield><subfield code="c">David E. Sanger</subfield></datafield><datafield tag="246" ind1="1" ind2="0"><subfield code="a">War, sabotage, and fear in the cyber age</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">New York</subfield><subfield code="b">Crown Publishers</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2018</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxiii, 357 Seiten</subfield><subfield code="c">25 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">From Russia, with love -- Original sins -- Pandora's inbox -- The hundred-dollar takedown -- Man in the middle -- The China rules -- The Kims strike back -- Putin's petri dish -- The fumble -- Warning from the Cotswolds -- The slow awakening -- Three crises in the valley -- Left of launch</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world's powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict. The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. </subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Cheap to acquire, easy to deny, and usable for a variety of malicious purposes--from crippling infrastructure to sowing discord and doubt--cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents--Bush and Obama--drew first blood with Operation Olympic Games, which used malicious code to blow up Iran's nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump's first year, turned back on the US and its allies. The government was often paralyzed, unable to threaten the use of cyberweapons because America was so vulnerable to crippling attacks on its own networks of banks, utilities, and government agencies. </subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger--who broke the story of Olympic Games in his previous book--reveals a world coming face-to-face with the perils of technological revolution. The Perfect Weapon is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target."--Dust jacket</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">Text in English</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Geopolitik</subfield><subfield code="0">(DE-588)4156741-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberterrorism / Prevention</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Internet and international relations</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Technology and international relations</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Internet in espionage</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberspace / Political aspects</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Hacking / Political aspects</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberterrorism</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Cyberterrorism / Prevention</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Information warfare</subfield><subfield code="0">(DE-588)4461975-3</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Geopolitik</subfield><subfield code="0">(DE-588)4156741-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="n">oe</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030468321</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">609</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">181</subfield></datafield><datafield tag="942" ind1="1" ind2="1"><subfield code="c">909</subfield><subfield code="e">22/bsb</subfield><subfield code="f">090512</subfield><subfield code="g">181</subfield></datafield></record></collection> |
id | DE-604.BV045077273 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T08:07:58Z |
institution | BVB |
isbn | 9780451497895 9781911617723 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030468321 |
oclc_num | 1045926871 |
open_access_boolean | |
owner | DE-12 |
owner_facet | DE-12 |
physical | xxiii, 357 Seiten 25 cm |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | Crown Publishers |
record_format | marc |
spelling | Sanger, David E. Verfasser (DE-588)1163849723 aut The perfect weapon war, sabotage, and fear in the cyber age David E. Sanger War, sabotage, and fear in the cyber age First edition New York Crown Publishers [2018] © 2018 xxiii, 357 Seiten 25 cm txt rdacontent n rdamedia nc rdacarrier From Russia, with love -- Original sins -- Pandora's inbox -- The hundred-dollar takedown -- Man in the middle -- The China rules -- The Kims strike back -- Putin's petri dish -- The fumble -- Warning from the Cotswolds -- The slow awakening -- Three crises in the valley -- Left of launch "In 2015, Russian hackers tunneled deep into the computer systems of the Democratic National Committee, and the subsequent leaks of the emails they stole may have changed the course of American democracy. But to see the DNC hacks as Trump-centric is to miss the bigger, more important story: Within that same year, the Russians not only had broken into networks at the White House, the State Department, and the Joint Chiefs of Staff, but had placed implants in American electrical and nuclear plants that could give them the power to switch off vast swaths of the country. This was the culmination of a decade of escalating digital sabotage among the world's powers, in which Americans became the collateral damage as China, Iran, North Korea, and Russia battled in cyberspace to undercut one another in daily just-short-of-war conflict. The Perfect Weapon is the startling inside story of how the rise of cyberweapons transformed geopolitics like nothing since the invention of the atomic bomb. Cheap to acquire, easy to deny, and usable for a variety of malicious purposes--from crippling infrastructure to sowing discord and doubt--cyber is now the weapon of choice for democracies, dictators, and terrorists. Two presidents--Bush and Obama--drew first blood with Operation Olympic Games, which used malicious code to blow up Iran's nuclear centrifuges, and yet America proved remarkably unprepared when its own weapons were stolen from its arsenal and, during President Trump's first year, turned back on the US and its allies. The government was often paralyzed, unable to threaten the use of cyberweapons because America was so vulnerable to crippling attacks on its own networks of banks, utilities, and government agencies. Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger--who broke the story of Olympic Games in his previous book--reveals a world coming face-to-face with the perils of technological revolution. The Perfect Weapon is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target."--Dust jacket Text in English Geopolitik (DE-588)4156741-9 gnd rswk-swf Information warfare (DE-588)4461975-3 gnd rswk-swf Cyberterrorism Cyberterrorism / Prevention Internet and international relations Technology and international relations Internet in espionage Cyberspace / Political aspects Hacking / Political aspects Information warfare (DE-588)4461975-3 s Geopolitik (DE-588)4156741-9 s DE-604 |
spellingShingle | Sanger, David E. The perfect weapon war, sabotage, and fear in the cyber age From Russia, with love -- Original sins -- Pandora's inbox -- The hundred-dollar takedown -- Man in the middle -- The China rules -- The Kims strike back -- Putin's petri dish -- The fumble -- Warning from the Cotswolds -- The slow awakening -- Three crises in the valley -- Left of launch Geopolitik (DE-588)4156741-9 gnd Information warfare (DE-588)4461975-3 gnd |
subject_GND | (DE-588)4156741-9 (DE-588)4461975-3 |
title | The perfect weapon war, sabotage, and fear in the cyber age |
title_alt | War, sabotage, and fear in the cyber age |
title_auth | The perfect weapon war, sabotage, and fear in the cyber age |
title_exact_search | The perfect weapon war, sabotage, and fear in the cyber age |
title_full | The perfect weapon war, sabotage, and fear in the cyber age David E. Sanger |
title_fullStr | The perfect weapon war, sabotage, and fear in the cyber age David E. Sanger |
title_full_unstemmed | The perfect weapon war, sabotage, and fear in the cyber age David E. Sanger |
title_short | The perfect weapon |
title_sort | the perfect weapon war sabotage and fear in the cyber age |
title_sub | war, sabotage, and fear in the cyber age |
topic | Geopolitik (DE-588)4156741-9 gnd Information warfare (DE-588)4461975-3 gnd |
topic_facet | Geopolitik Information warfare |
work_keys_str_mv | AT sangerdavide theperfectweaponwarsabotageandfearinthecyberage AT sangerdavide warsabotageandfearinthecyberage |