The hacker and the state :: cyber attacks and the new normal of geopolitics /
Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don't look anything like we thought they would. Packed with insider information based on interviews, declassif...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cambridge, Massachusetts :
Harvard University Press,
2020.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don't look anything like we thought they would. Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. His analysis moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to billion-dollar heists and election interference. Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. He explains why cyber attacks are far less destructive than we anticipated, far more pervasive, and much harder to prevent. With little fanfare and far less scrutiny, they impact our banks, our tech and health systems, our democracy, and every aspect of our lives. Quietly, insidiously, they have reshaped our national-security priorities and transformed spycraft and statecraft. The contest for geopolitical advantage has moved into cyberspace. The United States and its allies can no longer dominate the way they once did. The nation that hacks best will triumph. |
Beschreibung: | 1 online resource (412 pages) |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9780674246010 0674246012 9780674245983 0674245989 9780674245990 0674245997 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1141930618 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr |n||||||||| | ||
008 | 200227t20202020mau ob 001 0 eng d | ||
040 | |a YDX |b eng |e rda |e pn |c YDX |d OCLCO |d N$T |d EBLCP |d TEFOD |d UKAHL |d TOH |d DEGRU |d IBI |d OCLCO |d TFW |d OCLCO |d JSTOR |d OCLCQ |d OCLCO |d OCLCL |d OCLCA |d OCLCL |d TMA |d OCLCQ | ||
019 | |a 1142099190 |a 1158201743 |a 1162146202 |a 1176558763 |a 1191072740 | ||
020 | |a 9780674246010 |q (electronic bk.) | ||
020 | |a 0674246012 |q (electronic bk.) | ||
020 | |a 9780674245983 |q (electronic bk.) | ||
020 | |a 0674245989 |q (electronic bk.) | ||
020 | |a 9780674245990 |q (electronic bk.) | ||
020 | |a 0674245997 |q (electronic bk.) | ||
020 | |z 9780674987555 |q (hardcover) | ||
020 | |z 0674987551 |q (hardcover) | ||
035 | |a (OCoLC)1141930618 |z (OCoLC)1142099190 |z (OCoLC)1158201743 |z (OCoLC)1162146202 |z (OCoLC)1176558763 |z (OCoLC)1191072740 | ||
037 | |a EAE62516-D364-4666-A8B5-58CB87A01EAC |b OverDrive, Inc. |n http://www.overdrive.com | ||
037 | |a 22573/ctv33z8rgf |b JSTOR | ||
050 | 4 | |a QA76.9.A25 |b B823 2020eb | |
072 | 7 | |a POL |x 036000 |2 bisacsh | |
072 | 7 | |a POL |x 012000 |2 bisacsh | |
072 | 7 | |a POL |x 066000 |2 bisacsh | |
072 | 7 | |a HIS |x 027060 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8/7 |2 23 | |
049 | |a MAIN | ||
100 | 1 | |a Buchanan, Ben, |e author. |1 https://id.oclc.org/worldcat/entity/E39PCjvwJXFM9cmPDttJyy3DG3 | |
245 | 1 | 4 | |a The hacker and the state : |b cyber attacks and the new normal of geopolitics / |c Ben Buchanan. |
264 | 1 | |a Cambridge, Massachusetts : |b Harvard University Press, |c 2020. | |
264 | 4 | |c ©2020 | |
300 | |a 1 online resource (412 pages) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |2 rdamedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption. | |
520 | |a Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don't look anything like we thought they would. Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. His analysis moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to billion-dollar heists and election interference. Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. He explains why cyber attacks are far less destructive than we anticipated, far more pervasive, and much harder to prevent. With little fanfare and far less scrutiny, they impact our banks, our tech and health systems, our democracy, and every aspect of our lives. Quietly, insidiously, they have reshaped our national-security priorities and transformed spycraft and statecraft. The contest for geopolitical advantage has moved into cyberspace. The United States and its allies can no longer dominate the way they once did. The nation that hacks best will triumph. | ||
588 | |a Description based on print version record. | ||
650 | 0 | |a Cyber intelligence (Computer security) |0 http://id.loc.gov/authorities/subjects/sh2011005959 | |
650 | 0 | |a Hacking |x Political aspects. | |
650 | 0 | |a Cyberterrorism. |0 http://id.loc.gov/authorities/subjects/sh00001974 | |
650 | 0 | |a Cyberspace operations (Military science) |0 http://id.loc.gov/authorities/subjects/sh2013000988 | |
650 | 0 | |a Cyberspace |x Political aspects. | |
650 | 6 | |a Surveillance des menaces informatiques. | |
650 | 6 | |a Piratage informatique |x Aspect politique. | |
650 | 6 | |a Cyberterrorisme. | |
650 | 6 | |a Cyberguerre (Science militaire) | |
650 | 6 | |a Cyberespace |x Aspect politique. | |
650 | 7 | |a POLITICAL SCIENCE / Intelligence & Espionage. |2 bisacsh | |
650 | 7 | |a Cyber intelligence (Computer security) |2 fast | |
650 | 7 | |a Cyberspace operations (Military science) |2 fast | |
650 | 7 | |a Cyberspace |x Political aspects |2 fast | |
650 | 7 | |a Cyberterrorism |2 fast | |
758 | |i has work: |a The hacker and the state (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFQmjBmbdWfHH4fM4bvVhb |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |a Buchanan, Ben (Writer on cybersecurity). |t Hacker and the state. |d Cambridge, Massachusetts : Harvard University Press, 2020 |z 9780674987555 |w (DLC) 2019033274 |w (OCoLC)1112264305 |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2378565 |3 Volltext |
938 | |a De Gruyter |b DEGR |n 9780674246010 | ||
938 | |a Askews and Holts Library Services |b ASKH |n AH37294106 | ||
938 | |a YBP Library Services |b YANK |n 301119732 | ||
938 | |a ProQuest Ebook Central |b EBLB |n EBL6119381 | ||
938 | |a EBSCOhost |b EBSC |n 2378565 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1141930618 |
---|---|
_version_ | 1816882511886680064 |
adam_text | |
any_adam_object | |
author | Buchanan, Ben |
author_facet | Buchanan, Ben |
author_role | aut |
author_sort | Buchanan, Ben |
author_variant | b b bb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 B823 2020eb |
callnumber-search | QA76.9.A25 B823 2020eb |
callnumber-sort | QA 276.9 A25 B823 42020EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption. |
ctrlnum | (OCoLC)1141930618 |
dewey-full | 005.8/7 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8/7 |
dewey-search | 005.8/7 |
dewey-sort | 15.8 17 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05623cam a2200781 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1141930618</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr |n|||||||||</controlfield><controlfield tag="008">200227t20202020mau ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">YDX</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">YDX</subfield><subfield code="d">OCLCO</subfield><subfield code="d">N$T</subfield><subfield code="d">EBLCP</subfield><subfield code="d">TEFOD</subfield><subfield code="d">UKAHL</subfield><subfield code="d">TOH</subfield><subfield code="d">DEGRU</subfield><subfield code="d">IBI</subfield><subfield code="d">OCLCO</subfield><subfield code="d">TFW</subfield><subfield code="d">OCLCO</subfield><subfield code="d">JSTOR</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCL</subfield><subfield code="d">TMA</subfield><subfield code="d">OCLCQ</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">1142099190</subfield><subfield code="a">1158201743</subfield><subfield code="a">1162146202</subfield><subfield code="a">1176558763</subfield><subfield code="a">1191072740</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674246010</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0674246012</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674245983</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0674245989</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780674245990</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0674245997</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9780674987555</subfield><subfield code="q">(hardcover)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">0674987551</subfield><subfield code="q">(hardcover)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1141930618</subfield><subfield code="z">(OCoLC)1142099190</subfield><subfield code="z">(OCoLC)1158201743</subfield><subfield code="z">(OCoLC)1162146202</subfield><subfield code="z">(OCoLC)1176558763</subfield><subfield code="z">(OCoLC)1191072740</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">EAE62516-D364-4666-A8B5-58CB87A01EAC</subfield><subfield code="b">OverDrive, Inc.</subfield><subfield code="n">http://www.overdrive.com</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">22573/ctv33z8rgf</subfield><subfield code="b">JSTOR</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">B823 2020eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">036000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">012000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">POL</subfield><subfield code="x">066000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">HIS</subfield><subfield code="x">027060</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8/7</subfield><subfield code="2">23</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Buchanan, Ben,</subfield><subfield code="e">author.</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCjvwJXFM9cmPDttJyy3DG3</subfield></datafield><datafield tag="245" ind1="1" ind2="4"><subfield code="a">The hacker and the state :</subfield><subfield code="b">cyber attacks and the new normal of geopolitics /</subfield><subfield code="c">Ben Buchanan.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge, Massachusetts :</subfield><subfield code="b">Harvard University Press,</subfield><subfield code="c">2020.</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2020</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (412 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don't look anything like we thought they would. Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. His analysis moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to billion-dollar heists and election interference. Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. He explains why cyber attacks are far less destructive than we anticipated, far more pervasive, and much harder to prevent. With little fanfare and far less scrutiny, they impact our banks, our tech and health systems, our democracy, and every aspect of our lives. Quietly, insidiously, they have reshaped our national-security priorities and transformed spycraft and statecraft. The contest for geopolitical advantage has moved into cyberspace. The United States and its allies can no longer dominate the way they once did. The nation that hacks best will triumph.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2011005959</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Hacking</subfield><subfield code="x">Political aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberterrorism.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh00001974</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh2013000988</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Cyberspace</subfield><subfield code="x">Political aspects.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Surveillance des menaces informatiques.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Piratage informatique</subfield><subfield code="x">Aspect politique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberterrorisme.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberguerre (Science militaire)</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Cyberespace</subfield><subfield code="x">Aspect politique.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">POLITICAL SCIENCE / Intelligence & Espionage.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyber intelligence (Computer security)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace operations (Military science)</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberspace</subfield><subfield code="x">Political aspects</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Cyberterrorism</subfield><subfield code="2">fast</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">The hacker and the state (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFQmjBmbdWfHH4fM4bvVhb</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="a">Buchanan, Ben (Writer on cybersecurity).</subfield><subfield code="t">Hacker and the state.</subfield><subfield code="d">Cambridge, Massachusetts : Harvard University Press, 2020</subfield><subfield code="z">9780674987555</subfield><subfield code="w">(DLC) 2019033274</subfield><subfield code="w">(OCoLC)1112264305</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2378565</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">De Gruyter</subfield><subfield code="b">DEGR</subfield><subfield code="n">9780674246010</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Askews and Holts Library Services</subfield><subfield code="b">ASKH</subfield><subfield code="n">AH37294106</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">301119732</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest Ebook Central</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL6119381</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">2378565</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1141930618 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:29:47Z |
institution | BVB |
isbn | 9780674246010 0674246012 9780674245983 0674245989 9780674245990 0674245997 |
language | English |
oclc_num | 1141930618 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (412 pages) |
psigel | ZDB-4-EBA |
publishDate | 2020 |
publishDateSearch | 2020 |
publishDateSort | 2020 |
publisher | Harvard University Press, |
record_format | marc |
spelling | Buchanan, Ben, author. https://id.oclc.org/worldcat/entity/E39PCjvwJXFM9cmPDttJyy3DG3 The hacker and the state : cyber attacks and the new normal of geopolitics / Ben Buchanan. Cambridge, Massachusetts : Harvard University Press, 2020. ©2020 1 online resource (412 pages) text txt rdacontent computer rdamedia online resource rdacarrier Includes bibliographical references and index. Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption. Ever since WarGames, we have been bracing for the cyberwar to come, conjuring images of exploding power plants and mass panic. But while cyber attacks are now disturbingly common, they don't look anything like we thought they would. Packed with insider information based on interviews, declassified files, and forensic analysis of company reports, The Hacker and the State sets aside fantasies of cyber-annihilation to explore the real geopolitical competition of the digital age. Tracing the conflict of wills and interests among modern nations, Ben Buchanan reveals little-known details of how China, Russia, North Korea, Britain, and the United States hack one another in a relentless struggle for dominance. His analysis moves deftly from underseas cable taps to underground nuclear sabotage, from blackouts and data breaches to billion-dollar heists and election interference. Buchanan brings to life this continuous cycle of espionage and deception, attack and counterattack, destabilization and retaliation. He explains why cyber attacks are far less destructive than we anticipated, far more pervasive, and much harder to prevent. With little fanfare and far less scrutiny, they impact our banks, our tech and health systems, our democracy, and every aspect of our lives. Quietly, insidiously, they have reshaped our national-security priorities and transformed spycraft and statecraft. The contest for geopolitical advantage has moved into cyberspace. The United States and its allies can no longer dominate the way they once did. The nation that hacks best will triumph. Description based on print version record. Cyber intelligence (Computer security) http://id.loc.gov/authorities/subjects/sh2011005959 Hacking Political aspects. Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Cyberspace Political aspects. Surveillance des menaces informatiques. Piratage informatique Aspect politique. Cyberterrorisme. Cyberguerre (Science militaire) Cyberespace Aspect politique. POLITICAL SCIENCE / Intelligence & Espionage. bisacsh Cyber intelligence (Computer security) fast Cyberspace operations (Military science) fast Cyberspace Political aspects fast Cyberterrorism fast has work: The hacker and the state (Text) https://id.oclc.org/worldcat/entity/E39PCFQmjBmbdWfHH4fM4bvVhb https://id.oclc.org/worldcat/ontology/hasWork Print version: Buchanan, Ben (Writer on cybersecurity). Hacker and the state. Cambridge, Massachusetts : Harvard University Press, 2020 9780674987555 (DLC) 2019033274 (OCoLC)1112264305 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2378565 Volltext |
spellingShingle | Buchanan, Ben The hacker and the state : cyber attacks and the new normal of geopolitics / Part one. Espionage: Exploiting home-field advantage -- Defeating encryption -- Building a backdoor -- Strategic espionage -- Counterintelligence -- Part two. Attack: Strategic sabotage -- Targeted disruption -- Coercion -- Testing and demonstration -- Part three. Destabilization: Election interference -- Exposure -- Theft, ransom, and manipulation -- Widespread disruption. Cyber intelligence (Computer security) http://id.loc.gov/authorities/subjects/sh2011005959 Hacking Political aspects. Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Cyberspace Political aspects. Surveillance des menaces informatiques. Piratage informatique Aspect politique. Cyberterrorisme. Cyberguerre (Science militaire) Cyberespace Aspect politique. POLITICAL SCIENCE / Intelligence & Espionage. bisacsh Cyber intelligence (Computer security) fast Cyberspace operations (Military science) fast Cyberspace Political aspects fast Cyberterrorism fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh2011005959 http://id.loc.gov/authorities/subjects/sh00001974 http://id.loc.gov/authorities/subjects/sh2013000988 |
title | The hacker and the state : cyber attacks and the new normal of geopolitics / |
title_auth | The hacker and the state : cyber attacks and the new normal of geopolitics / |
title_exact_search | The hacker and the state : cyber attacks and the new normal of geopolitics / |
title_full | The hacker and the state : cyber attacks and the new normal of geopolitics / Ben Buchanan. |
title_fullStr | The hacker and the state : cyber attacks and the new normal of geopolitics / Ben Buchanan. |
title_full_unstemmed | The hacker and the state : cyber attacks and the new normal of geopolitics / Ben Buchanan. |
title_short | The hacker and the state : |
title_sort | hacker and the state cyber attacks and the new normal of geopolitics |
title_sub | cyber attacks and the new normal of geopolitics / |
topic | Cyber intelligence (Computer security) http://id.loc.gov/authorities/subjects/sh2011005959 Hacking Political aspects. Cyberterrorism. http://id.loc.gov/authorities/subjects/sh00001974 Cyberspace operations (Military science) http://id.loc.gov/authorities/subjects/sh2013000988 Cyberspace Political aspects. Surveillance des menaces informatiques. Piratage informatique Aspect politique. Cyberterrorisme. Cyberguerre (Science militaire) Cyberespace Aspect politique. POLITICAL SCIENCE / Intelligence & Espionage. bisacsh Cyber intelligence (Computer security) fast Cyberspace operations (Military science) fast Cyberspace Political aspects fast Cyberterrorism fast |
topic_facet | Cyber intelligence (Computer security) Hacking Political aspects. Cyberterrorism. Cyberspace operations (Military science) Cyberspace Political aspects. Surveillance des menaces informatiques. Piratage informatique Aspect politique. Cyberterrorisme. Cyberguerre (Science militaire) Cyberespace Aspect politique. POLITICAL SCIENCE / Intelligence & Espionage. Cyberspace Political aspects Cyberterrorism |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=2378565 |
work_keys_str_mv | AT buchananben thehackerandthestatecyberattacksandthenewnormalofgeopolitics AT buchananben hackerandthestatecyberattacksandthenewnormalofgeopolitics |