( BOOKS The Perfect Weapon How the Cyber Arms Race Set the World Afire ) ´ David E. Sanger – ecogenlife.org
Philip Graham is credited with calling journalism the first rough draft of history The uthor of The Perfect Weapon David E Sanger one of the highly respected journalists for the New York Times called his book current history I m going with polished second draft of history As daily reader of The Times I lready had some familiarity with the topics covered in Mr Sanger s book However that reading did not prepare me for what I learned from the depth of research Raiding with Morgan and clarity of writing presented by Mr Sanger in each chapter And it sll here Iran s nuclear centrifuges blowing up North Korean missiles falling out of the sky China s remarkable nd frightening rise of power in cyberspace the Russian influence in the 2016 election nd United States president that is utterly clueless in regard to cybersecurity but still ble to spout utter nonsense when Lethal Licorice (Amish Candy Shop Mystery, asked to discuss our current cyberageMr Sanger used two words in his subtitle that stand out most to mefter finishing his book War nd Fear Although Mr Sanger didn t ctually state that we re in Rogue on the Rollaway an ongoing cyberwar I believe were nd to borrow from the heading of the final chapter the ongoing cyberwar is just left of conventional war The fear or fears re first most Americans including myself re blissfully unaware of the ongoing war until we re struck by the digital euivalent of shrapnel that inflicts permanent damage on our lives The second fear the knowledge that there is subset of Americans ctively nd gleefully consciously nd unconsciously iding nd betting the same cyberwar enemies that our country is fighting gainst This is must read book in my opinion I lso recommend checking out Lights Out A Cyberattack A Nation Unprepared Surviving the Aftermath by Ted Koppel LikeWar The Weaponization of Social Media by PW Singer nd ET Brooking nd Click Here to Kill Everybody Security nd Survival in Hyper Connected World by Bruce Schreiner r e v i e w As we put utonomous cars on the road connect Alexas to our homes put ill protected Internet connected videos cameras nd conduct our financial lives over our cell phones our vulnerabilities expand exponentially David E SangerThe Perfect Weapon is n Haunted House Murder (A Lucy Stone Mystery, absolutely terrifying piece of literature which delves deeply into the rise of cyber warfarend how it has Sweet Southern Hearts (A Willow Hill Novel Book 3) altered the lines of geopolitics world economynd even the everyday lives of civilians Sanger largely focusses on the Seven Sisters of cyber conflict The United States Russia China Britain Iran Israel nd North Korea how cyber conflict has expanded since the revelation of the AmericanIsraeli ttacks on Iran s nuclear program He explores how great nd small powers like have moved into new era of constant sabotage misinformation nd fear in which everyone is Daddy's Girl Series: A Taboo Erotic Collection a target The message islarming Rarely in human history has new weapon been dapted with such speed customised to fit so many different tasks nd exploited by so many nations to reshape their influence on global ffairs Sanger writes He goes on that cyber weapons have the capability to fry power grids stop trains silence cell phones nd overwhelm the internetIf these doomsday scenarios re the future the future is now It is well known that the US Dark Tides (Dark Tides and Israel planted computer virus known by the code name Stuxnet into Iran s nuclear facilities causing centrifuges to spin out of control Weathering the Storm and setting back its nuclear program for years Russia resorted to cyber war in Ukraines part of its conventional invasion And of course Russia used cyber weapons to influence the 2016 US Presidential elections Wrong for Me (Motor City Royals, as wells the Brexit vote And this is just the tip of the iceberg covered by David Sanger North Korea s ttack on Sony Pictures just to prove its point or her swindling of nearly billion dollars from Bangladesh it felt like I was reading of Fiddle: One Woman, Four Strings, and 8,000 Miles of Music a sci fi thriller The fact that privacy is myth nd no one is exonerated from the clutches of cyber war is far than chilling Whilst the book mostly covers bout the clashes between the US nd other governments the reality that the lives of civilians re Downright Dead at stakes collateral is shocking nd scary The technological dvancement in cyber warfare has improved so much that missiles can be disabled even before they can be fired The personal e mails chats nd files exchanged which re supposedly encrypted Left Fur Dead and securere not s secure s it is claimedWe re ware of the kind of traditional warfare where countries go to war Death by Tea at the borders with their guns blazing Civiliansre seldom directly involved uite recently when the Chinese soldiers intruded Loyalty and Lies (Chastity Falls, across Indian borders which later led to bloodbath we were uite comfortably watching the news of Amitabh Bachchan being tested positive for COVID19 This safe haven doesn t exist in the realm of cyber warfare It is the scenario where our most intimate secrets that re safely locked nd hidden in our mobile phones laptops or hard disks et By Way Of A Wager al can be easily erased or worse stolen The power supply to our homes be cut or our bankccounts can be emptied It would take months to just figure out who the perpetrator was nd lmost impossible to undo the damages In this new nd expanding form of warfare the civilians re the inevitable collateral damage The book was well paced nd the language used was crisp reflecting that Sanger has worked for three decades t The New York Times In the 21st century we have seen When Kingdom Comes a toward blurring the lines between the states of warnd peace Wars re no longer declared nd having begun proceed The Wayward Bride (Besotted Scots, according ton unfamiliar template says David E SangerIs this book relevant to ll After reading I have covered the camera of my laptop with tape strengthened my passwords Such a Dance and thoroughlyssessed the permissions granted to various pps in my phone That s what The Perfect Weapon made me cynical cautious nd importantly ware bout the dark reality of the digital world The book is easily one of most thrilling nd terrifying non fiction books I have ever come crossRating 47 5 Russia nd China have penetrated so deeply into the electronic systems that sustain the American economy that either country might be ble to set us back two or three decades using cyber weapons North Korea La bte du marais and Iranppear to be not far behind What seems to be stopping them Laos: Keystone Of Indochina all is the eual or greaterbility of the United States to do. From the premiere New York Times Washington correspondent How Foreign Policy Decisions Are Made In The Third World a stunningnd incisive look into how cyberwarfare is influencing elections threatening national security nd bringing us to the brink of global warBehind the Russian cyberattacks that may have thrown the 2016 election; behind the Sony hack; behind mysterious power outages round the world Geeking Out on 11C and the disappearance of thousands of personnel records from poorly guarded government serversre the traces of Et ainsi de suite a newnd powerful weapon one that has the potential to remake global conflict like nothing since the invention of the tomic bomb The Perfect Weapon is
The same or worse to them not to mention the chance we might reduce their countries to cinders with nuclear weapons That s the message t the heart of David E Sanger s chilling new book The Perfect Weapon Great power competition not terrorism is now the primary focus on US national security he writes And that competition is increasingly playing out onlineThe US government has been slow on the uptake to Historias sobre los Fondos Bahá'ís acknowledge this threat In 2007 the intelligence community snnual worldwide threat Reasoning with the Infinite: From the Closed World to the Mathematical Universe assessment delivered to Congress did not even include cyber weapons on the list At that point both Russiand China had been building their cyber capabilities for years Now of course Real Food/Fake Food: Why You Don’t Know What You’re Eating and What You Can Do About It attitudes have changed The United States Cyber Command created in 2009 was upgraded only in 2018 into Unified Combatant Command one of ten in the US rmed forces Cyber Command is headuartered t Fort Meade long with the National Security Agency nd is commanded by the gency s director Together NSA nd Cyber Command house both our country s offensive nd defensive cyber operations Sanger explains that the two organizations work together uneasily Their priorities re sometimes t cross purposesExcessive caution bout the threat of cyber weaponsDavid Sanger is extraordinarily well connected in Washington He has been writing on foreign policy globalization nuclear proliferation nd the presidency for than thirty years for the New York Times He has been the paper s Chief Washington Correspondent since 2006 Throughout The Perfect Weapon he cites one on one conversations with nearly ll the major players in the drama he describes And drama it is This book details the bureaucratic turf wars foot dragging incompetence nd excessive caution that has so often characterized America s inadeuate response to the threat posed by cyber weaponsThe dilemma Sanger describes is worrisome America s offensive cyber prowess has so outpaced our defense that officials hesitate to strike back he writes Although American companies nd government re penetrated online thousands of times every day the government has rarely spoken out to denounce those responsible Partly this is because it may take days weeks or even months to ssemble definitive proof Mr Darcy's Cottage of Earthly Delights: Shades of Pride and Prejudice about who launched given ttack But it s lso because officials in the CIA NSA Pentagon nd White House re unwilling for our dversaries to gain ny insight into how we obtained the information Even when we know perfectly well who s responsible they decline to speak out Simply citing specific evidence could reveal the existence of American or Allied implants in their computer systems Like many of the top former officials he interviewed Sanger regards that reluctance to show our cards s n errorThe US has only rarely The Cat Who Lived with Anne Frank activated cyber weaponsUnless the government canccuse n dversary in public it s hampered from retaliating The upshot is that the US has only rarely ctivated cyber weapons so far s we know The most notable exceptions were the Stuxnet ttack on Iran s nuclear production facilities in 2010 carried out jointly with Israel nd the Yoga Kitchen: Divine Recipes from the Shoshoni Yoga Retreat attack on North Korea s launch systems that caused its missiles to explode or fall into the sea However Russia has not hesitated tottack weaker nations chiefly Ukraine Design Works: How to Tackle Your Toughest Innovation Challenges Through Business Design and Estonias well s both the United States nd Western EuropeAs Sanger points out there re ways however inadeuate that the United States might combat nuclear ttack There is lways warning even if it s measured only in minutes With cyber weapons however there is no warning And In lmost every classified Pentagon scenario for how future confrontation with Russia nd China even Iran nd North Korea might play out the dversary s first strike gainst the United States would include cyber barrage imed t civilians And the threat isn t limited to those four hostile countries A decade go Sanger notes there were three or four nations with effective cyber forces now there re than thirty Now we face the proliferation of cyber weapons not just nuclear devicesAbout the Loyalty and Lies (Chastity Falls, authorDavid E Sanger has written two books on American foreign policys well s The Perfect Weapon his most recent work He is the Chief Washington Correspondent for the New York Times David Sanger is simply the best writer live working on issues of global nd American security nd his latest book proves how far Jeep. Sur les traces de la lgende ahead he is of everyone else in his field His meticulous reportingnd cogent nalysis of where cyber warfare is headed makes n urgent The Abbeyville Way argument for international standards digital Geneva Convention is mentioned to be discussed nd dopted with haste From the Iranian centrifuge sabotage to Russian hacking of Ukrainian power systems Stations of the Lost: The Treatment of Skid Row Alcoholics and American election tampering Sanger exposes how little understood these new capabilitiesre nd makes powerful case that this confusion could lead us to Treasure Diver (Choose Your Own Adventure, a very dangerous place THE PERFECT WEAPON is gripping insightful read that I can t recommend enough This is A Shot at Love an excellentnd terrifying read The Russians Old Records Never Die: One Man's Quest for His Vinyl and His Past and Chinesend North Koreans Ask an Astronaut are in the housend it seems that this Dead of Night administration is nott The Voyage Unplanned allware of the magnitude of the threat Sanger has The Dwelling a lot ofccess nd depth of knowledge on the issues nd this history He s lso Vienna 1814: How the Conquerors of Napoleon Made War, Peace, and Love at the Congress of Vienna an excellent writer I do have some critiues he seems to think that the olympic games project where the USnd Israel hacked into the Iranian computer networks was completely justified though he worries bout its effects I m not so sure Seems bit sanctimonious to say when we did it it was totally responsible nd justified Now that everyone else is doing it it s not TLDR Must Read Very scary We re screwed Kill your social media ccounts Abandon technology Start Adaptations: From Short Story to Big Screen: 35 Great Stories That Have Inspired Great Films a homestead Cynicsre on to somethingFull Review The threat of Nuclear Weapons nd rise of Global Warming have occupied the top spot in the list of humanity s gravest concerns for s long s I can remember nd rightly so We have Easy arrivedt the point in our times where just Morrissey y los atormentados a few players controlling history s deadliestrsenal can hit the reset button nd send us ll back to n ge when sticks Interview with the Vampire and rocks were considered very high tech And it wouldll happen very fast Similarly the slow decline of our planet s condition due to pollution over harvesting of natural resources Emma of Aurora (Change and Cherish Historical and snail paceddoption of sustainable pr. He riveting story of how in less than decade cyberwarfare displaced terrorism nd nuclear The Best Cook in the World: Tales from My Momma's Table attackss the greatest threat to American national security Cheap to cuire difficult to defend gainst nd designed to shield their user's identities so s to complicate retaliation these weapons Ravished by a Duke are capable ofn unprecedented range of offensive tactics; they can take us just short of war Damn Delicious Meal Prep allowing for everything from disruption to theft to the cause of widespread damage of essential infrastructure systems And the vulnerability of those systems has created related but eually urgent conflict American companies like.
Actices have brought us closer to the teetering edge of major global crisis Fortunately the political nd social visibility of these issues respectively have ensured healthy if not insufficient mount of discourse After Deep Lane: Poems all it s easy to see rockets on parade massive landfillsnd melting glaciers But what Komisario Nuusku ja makkaratehtaan arvoitus about invisible bits of code yeah I used bit there in the double sense I m so cleverr freely crawling through cyberspace waiting for the right moment to bring our mighty technological empiresll crashing downIn The Perfect Weapon David Sanger makes very compelling case for the imperative to start conversation regarding the use of Cyber Weapons by nation states Their full implications re slowly starting to be revealed nd it s high time we start treating them with the same import Our Necessary Shadow: The Nature and Meaning of Psychiatry as those previously discussed Scariest by far is our inability to properly gauge the reach of their damagend to understand the full extent to which they re eroding our political nd social institutions Sure when hackers bring down The Online Diary of a Masochistic Submissive an exchange or stop you fromccessing your bank ccount we can count the millions in lost revenue down to the minute But when the target is power grid serving millions of households Industry and Empire: The Birth of the Industrial Revolution and hundreds of hospitals the currency we count with is in lives These weaponsre symmetrical cheap easy to deploy delivered t digital speed nd re not deterred by borders or physical boundaries Cyberweapons re entirely different from nuclear rms nd their effects have so far remained relatively modest But to ssume that will continue to be true is to My Lady Viper assume we understand the destructive power of the technology we have unleashednd that we can manage it History suggests that is Sunflower a risky bet And let s not forget the disruption broughtbout by those social media platforms that not too long go were celebrated for their bility to bring democracy Periyar: A Political Biography of E.V. Ramasamy and free speech to remote parts of the world under totalitarian rule There now part nd parcel of new breed of Doughnuts: Simple and Delicious Recipes to Make at Home attack on the same institutions they once sought to protect On Russia s capabilities to use thesettacks Sanger writes The Internet Research Agency could ctually degrade social media s organizational power through weaponizing it The ease with which its news writers impersonated real Americans or real Europeans or nyone else meant that over time people would lose trust in the entire platform For Putin who looked t social media s role in fomenting rebellion in the Middle East nd organizing opposition to Russia in Ukraine the notion of calling into uestion just who was on the other end of Tweet or Facebook post of making revolutionaries think twice before reaching for their smartphones to organize would be delightful by product It gave him two ways to undermine his dversaries for the price of one If Sanger is correct nd it s hard to rgue gainst his point we have ll become part of the weapon system nd what is worse we Commit!: Unlock Your Full Potential and Learn to Lead Yourself are just cluelessly strollinground this new battlefield too Posts shares tweets nd likes could prove just s noxious to society Announcing Trouble as ignorance prejudicepathy nd complacency Taking pride in participating in the democratic process every election cycle is no longer sufficient it seems We must make n effort to become savvier in the ways in which what we choose to use share The Book of Revelation: and engage with is used to distabilizen ever increasing technological dependent interconnected world We could The Sound of Music Story: How A Beguiling Young Novice, A Handsome Austrian Captain, and Ten Singing von Trapp Children Inspired the Most Beloved Film of All Time all be responsible in this respectwareness leads to discussionAfter reading Sanger s excellently written Edward Keating: Main Street: The Lost Dream of Route 66 and thorough examination of the role of Cyber Weapons in the 21st century I m convinced they pose the most immediate threat to our timesnd way of life Please do yourself favor nd t least skim its pages nd see for yourself Start there If you have read Factfulness by Hans Rosling you d be inclined to dispute this point but my biggest issue with the book is that it took the long term effects of this prosperity far too lightly See my review This book consists largely of the retelling of cyber Cold Blood attack incidents that have previously been in the news over the past ten years However the retelling in this bookt this time has the Calibre (Inspector Brant, advantage of hindsight which provides the enabling perspective regarding background motivend ttribution that were largely uncertain when the stories were first reported Additionally encompassing ll these stories into one book t this time llows the pondering of their ramifications on privacy crime nd international relationsSome of the better known 66th book for 2018Nice summary of current situation round cyberwar from The Dirty Game: Uncovering the Scandal at FIFA an American perspective This is scary world where large state players China nd Russia but lso North Korea nd Iran re increasingly intruding April Blood: Florence and the Plot Against the Medici attacking US targets The US is largely unprotected from cyberattack which could take down power water etc relatively easily Having read this it s really unclear how secure US voting systems No Life But This are fromn ttack during 2018 election cycle Well worth read A nice complement to Russian Roulette which covers some of the same material s it relates to Russia s hacking of the 2016 US Elections 4 stars This was great review of the political The Invention of Science: A New History of the Scientific Revolution and cyber landscape over the past decade or so Not much new information if you have been followinglong but really well condensed into The Philosophers Pupil a single source which gives things broader context How to the laws of warpply to cyber That is the uestion Why not just manipulate North Korea s missile launches software prior to launch nd thereby plunging them into the sea shortly fter takeoff Well that would Blind Watchmaker amount to preemptive war in violation of international law So when Sanger seeks informationbout those failures t the Pentagon he s met with stony silence Yet cyber manipulation has happened before namely when the US nd Israel caused Iran s nuclear centrifuges to whirl off into destructive spins Indeed cyber is indeed part of ny future war one country s bility to plunge nother into utter darkness so fast that retaliation is impossible In many ways the US has been Cannibal Sector 1: The Kingdom of Death in the World of Progress asleep to realities of cyber intrusionsnd hacks Bureaucratic infighting Chinese stealing our intellectual property silly And what Chanakya: the Master of Statecraft about Russian intrusions in into our election processes Clear straightforward news reporting narrative Overall message Wake Up. Applend Cisco must claim Escape Clause (Virgil Flowers, allegiance to no government in the name of selling secure productsround the globe yet the US intelligence gencies want the help of such companies in defending gainst future cyberattacks Reported nd written with unprecedented ccess by New York Times chief Washington correspondent nd bestselling uthor David Sanger The Perfect Weapon takes readers inside war rooms Transcend and boardrooms into the secret cyberdens of Americannd Chinese military to give the deep background story of the increasingly pitched battle between nations their governments their cyberwarriors nd their corporatio.