The Hacked World Order: How Nations Fight, Trade, Maneuver, and Manipulate in the Digital Age

Sold by PublicAffairs
2
Free sample

In this updated edition of The Hacked World Order, cybersecurity expert Adam Segal offers unmatched insight into the new, opaque global conflict that is transforming geopolitics.
For more than three hundred years, the world wrestled with conflicts between nation-states, which wielded military force, financial pressure, and diplomatic persuasion to create "world order." But in 2012, the involvement of the US and Israeli governments in Operation "Olympic Games," a mission aimed at disrupting the Iranian nuclear program through cyberattacks, was revealed; Russia and China conducted massive cyber-espionage operations; and the world split over the governance of the Internet. Cyberspace became a battlefield.
Cyber warfare demands that the rules of engagement be completely reworked and all the old niceties of diplomacy be recast. Many of the critical resources of statecraft are now in the hands of the private sector, giant technology companies in particular. In this new world order, Segal reveals, power has been well and truly hacked.
Read more

About the author

Adam Segal is the Ira A Lipman Chair in Emerging Technologies and National Security and Director of the Digital and Cyberspace Policy Program. His work has appeared in the Financial Times, Economist, Foreign Policy, Wall Street Journal, and Foreign Affairs, among others.
Read more
5.0
2 total
Loading...

Additional Information

Publisher
PublicAffairs
Read more
Published on
Feb 23, 2016
Read more
Pages
320
Read more
ISBN
9781610394161
Read more
Language
English
Read more
Genres
Computers / Security / Online Safety & Privacy
Political Science / International Relations / General
Political Science / Security (National & International)
Read more
Content Protection
This content is DRM protected.
Read more
Read Aloud
Available on Android devices
Read more
Eligible for Family Library

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
Red teaming. It is a practice as old as the Devil's Advocate, the eleventh-century Vatican official charged with discrediting candidates for sainthood. Today, red teams-comprised primarily of fearless skeptics and those assuming the role of saboteurs who seek to better understand the interests, intentions, and capabilities of institutions or potential competitors-are used widely in both the public and private sector. Red teaming, including simulations, vulnerability probes, and alternative analyses, helps institutions in competitive environments to identify vulnerabilities and weaknesses, challenge assumptions, and anticipate potential threats ahead of the next special operations raid, malicious cyberattack, or corporate merger. But not all red teams are created equal; indeed, some cause more damage than they prevent.

In Red Team, national security expert Micah Zenko provides an in-depth investigation into the work of red teams, revealing the best practices, most common pitfalls, and most effective applications of these modern-day Devil's Advocates. The best practices of red teaming can be applied to the CIA, NYPD, or a pharmaceutical company, and executed correctly they can yield impressive results: red teams give businesses an edge over their competition, poke holes in vital intelligence estimates, and troubleshoot dangerous military missions long before boots are on the ground. But red teams are only as good as leaders allow them to be, and Zenko shows not only how to create and empower red teams, but also what to do with the information they produce.

Essential reading for business leaders and policymakers alike, Red Team will revolutionize the way organizations think about, exploit, compensate for, and correct their institutional strengths and weaknesses. Drawing on little-known case studies and unprecedented access to elite red teamers in the United States and abroad, Zenko shows how any group-from military units to friendly hackers-can win by thinking like the enemy.
A generation ago, "cyberspace" was just a term from science fiction, used to describe the nascent network of computers linking a few university labs. Today, our entire modern way of life, from communication to commerce to conflict, fundamentally depends on the Internet. And the cybersecurity issues that result challenge literally everyone: politicians wrestling with everything from cybercrime to online freedom; generals protecting the nation from new forms of attack, while planning new cyberwars; business executives defending firms from once unimaginable threats, and looking to make money off of them; lawyers and ethicists building new frameworks for right and wrong. Most of all, cybersecurity issues affect us as individuals. We face new questions in everything from our rights and responsibilities as citizens of both the online and real world to simply how to protect ourselves and our families from a new type of danger. And yet, there is perhaps no issue that has grown so important, so quickly, and that touches so many, that remains so poorly understood. In Cybersecurity and CyberWar: What Everyone Needs to Know®, New York Times best-selling author P. W. Singer and noted cyber expert Allan Friedman team up to provide the kind of easy-to-read, yet deeply informative resource book that has been missing on this crucial issue of 21st century life. Written in a lively, accessible style, filled with engaging stories and illustrative anecdotes, the book is structured around the key question areas of cyberspace and its security: how it all works, why it all matters, and what can we do? Along the way, they take readers on a tour of the important (and entertaining) issues and characters of cybersecurity, from the "Anonymous" hacker group and the Stuxnet computer virus to the new cyber units of the Chinese and U.S. militaries. Cybersecurity and CyberWar: What Everyone Needs to Know® is the definitive account on the subject for us all, which comes not a moment too soon. What Everyone Needs to Know® is a registered trademark of Oxford University Press.
©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.