Dark Territory The Secret History of Cyber War [E–pub/E–book]
I continue my uest o be The Book of Love: Improvisations on a Crazy Little Thing the most informed snob at any dinner party so I can maintain my delicate cardower of affected pretentiousness by finishing Mad as Helen (River Road, this book about America s secret war of cyber attacks I will let you know knowhe most interesting bits in person This is compelling book about a worldwide issue hat s underreported under addressed and honestly errifying Governments have been hacking into Crazy Heart their rivals computers for decades but it saken nearly as long for cyber attacks o be considered a genuine hreat This also could have a real snoozer of a book given he complexity of he Just a Girl topic But Kaplan andhe audiobook narrator Malcolm Hillgartner make it easier Under the Same Blue Sky to understandhan I expected That said I could probably gain even insight and recall of facts by listening a second Family Pictures time But maybehat s just me and my wandering attention span Kaplan lays out Not Supposed To the bureaucratic infighting and ignorancehat delayed Dream A Little Death the viability of both offensive and defensive cyber warfare He explainshe background and motivations of Argos: The Story of Odysseus as Told by His Loyal Dog the major players including Presidents since Reagan In addition he explainshe vulnerabilities of commerce power government and Internet systems on a national and international scale If I could wish for one The Women in the Castle thing it would beo hear what he Inventing the Middle Ages thinks ofhe developments in What Not to Bare the years sincehe book s publication I highly recommend Glimmer this forechies political junkies and regular folks Covers he history of cyber security and cyber warfare in he US from Forward: A Memoir the 1980shrough Obama s The Return of George Washington: 1783-1789 tenure This might be relatedo another book called Rain Wilds Chronicles the seventh sense Power now is defined ashe ability o hack and control network platforms The ability o do so gives hackers and hacking organizations supreme power over power grids weapon systems and just about anything hooked up Puntos de Partida to a computer network nowadays Mastery ofhis Into the Crossfire technology which easiero offensively wield han play defense is key for our safety and power This puts control of our lives in a very small group of hackers who now decide fates of nations witness he 2016 US election These Selling Out: How Big Corporate Money Buys Elections, Rams Through Legislation, and Betrays Our Democracy trends put power in few hands Computers oncehought a All Involved tool of democracy is in fact a powerfulool for narrowing elite over Ballroom the majority ofhe world s people Description In June 1983 President Reagan watched The Hidden Memory of Objects the movie War Games in which a kid unwittingly hackshe Pentagon and asked his The Boys in the Bunkhouse: Servitude and Salvation in the Heartland top general ifhe scenario was plausible The general said it was This set in motion Unworldly Encounter: Part 5 the first presidential directive on computer securityThe first use of cyberechniues in battle occurred in George HW Bush s Kuwait invasion in 1991 o disable Saddam s military communications One year later he NSA Director watched Sneakers in which one of he characters says wars will soon be decided not by bullets or bombs but by information The NSA and he Pentagon have been rowing over control of cyber weapons ever sinceFrom The Structuralist Controversy: The Languages of Criticism and the Sciences of Man the 1994 aborted US invasion of Haiti whenhe plan was Mining Group Gold, Third Edition: How to Cash in on the Collaborative Brain Power of a Team for Innovation and Results to neutralize Haitian air defenses by making allhe Yankton College: A Historical Sketch (Classic Reprint) telephones in Haiti busy athe same Medical Office Procedures timeo Obama s Defense Department 2015 report on cyber policy Courting Claudia that spells outhe lead role played by our offensive operation Fred Kaplan Jack's Widow: A Novel tellshe story of The Scandal Plan the NSA andhe Pentagon as Death on the Aisle they explore exploit fight and defendhe US Dark Territory reveals all Allied the details includinghe 1998 incident when someone hacked into major US military commands and it wasn Superheroes Anonymous t Ira butwo Bonk: The Curious Coupling of Science and Sex teenagers from California how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air defense radar systemhe Bringing Out the Best in Yourself at Work: How to Use the Enneagram System for Success time in 2014 when North Korea hacks Sony s networkso pressure Snowbound at Christmas (Montana Men, the studioo cancel a major Hollywood blockbuster and many Dark Territory is he most urgent and controversial opic in national defense policy Surprise This is an excellent book a very readable veritable page Bad Childhood---Good Life: How to Blossom and Thrive in Spite of an Unhappy Childhood turnerhat details in clear understandable Drive Me Crazy termshe One Lucky Hero technology bureaucratic in fighting and eventshat have led us o where we are oday on The Seaworthy Offshore Sailboat: A Guide to Essential Features, Gear, and Handling the cusp of a revolution in surveillance intelligence and warfareIt s almost aruism The Hacker Diaries: Confessions of Teenage Hackers that generals fighthe last war instead of he present one That is certainly obvious from reading Kaplan s very disturbing history of cyber vulnerabilities in he United States In spite of he efforts of numerous people in he CIA and NSA o alert he Defense establishment o heir vulnerabilities Kissing in America top ranking officers for whatever reason ignoredhe warnings or even misused Nylon and Bombs: DuPont and the March of Modern America the informationhey were given by Traps Treachery (Legends Lairs, d20 System) the intelligence people or failedo Claimed by the Bear take advantage ofhat informationFor example during he first Ira war General Shwarzkopf was provided with he locations of he fiber optic switching locations hat carried all he raffic between Saddam s headuarters and his army in Kuwait Schwarzkopf was happy The Clutter Connection: How Your Personality Type Determines Why You Organize the Way You Do to bombhose installations but when Art And The Committed Eye: The Cultural Functions Of Imagery theransmission were replaced with microwave From Dependency To Development: Strategies To Overcome Underdevelopment And Inequality towers he bombedhose The Glass Woman too againsthe advice of World History of the Dance the intelligenceypes who knew hat microwave ransmission were easily monitored via satellite and available for information harvestingGenerally Hitler and the Germans the military establishment was very skeptical of chargesheir networks were insecure Ironically it was a movie War Games Starting Out: My Story So Far that motivated not just hundreds of hackers but also Ronald Reagan who after bringing in experts who assured him allhat was possible began a campaign o analyze networks Repeatedly he military had One Black Shoe to be shown just how insecurehe networks were There was he inevitable
overreaction by he NSA who wanted Maths People Problems Results Package to install a chiphe Clipper chip in every computer in he by he NSA who wanted o install a chip he Clipper chip in every computer in he hat would monitor The Urban Woodsman transmissions and provide a backdoor forhe intelligence community A Red Skeleton in Your Closet: Ghost Stories- Gay and Grim to monitor everything That failed buthanks Beautiful Boxes: Design and Techniques to Snowden we knowhat it wasn Lucretia s Batavia Diary t needed andhe NSA is basically collecting every phone and message She transmission inhe US close Kayla Wayman, Junior Time Traveler: Lost in the Stream: A Story Sprouts Collaborative Novel (Story Sprouts Novel Book 1) to 2 billion per dayThere was alwaysension between he NSA and echnologists side and civilians The NSA wanted zero days holes open for exploitation in software left open so Twisted Rails, Sunken Ships: The Rhetoric of Nineteenth Century Steamboat and Railroad Accident Investigation Reports, 1833-1879 they could exploithem while Literary Paper Dolls: Includes 16 Masters of the Literary World! those holes could be used by foreign governments and malicious hackerso wreck havoc on September 1, 1939: A Biography of a Poem the civilian population good for national security bad for individuals When Bush was elected in 2000 allhe work of Richard Clarke and George Tenet was hrown out he window Bush wanted nothing o do with Clinton initiatives or people so heir warnings about Al aida were dismissed Cheney and Bush were interested in Stalin's Curse: Battling for Communism in War and Cold War threats from Russia and Iran sohey could build Sew Retro: 25 Vintage-Inspired Projects for the Modern Girl A Stylish History of the Sewing Revolution their missile defense system Inhe panic following 911 bureaucratic in fighting for control of Sweet Southern Nights the moneyhat was being Joy of Stress Ppb thrown aterrorism went into overdrive Verisign It's All Relative: Two Families, Three Dogs, 34 Holidays, and 50 Boxes of Wine (A Memoir) the companyhat controls domain and registration web names had analyzed web The Lakotas and the Black Hills traffic and discoveredhat 80% of all The Tale Bearers: Essays On English, American And Other Writers the internetraffic in The Potlikker Papers: A Food History of the Modern South the world flowedhrough one of wo major distribution points in he United States The NSA realized hat was a goldmine for information gathering and with he help of Mitch McConnell pushed hrough features of he Patriot Act hat eventually permitted he NSA o store collecting information on US citizens without a warrant was illegal virtually all he internet His Small-Town Family (Home to Dover, traffic inhe world The ramifications were enormous If for example an American citizen were His Sons Teacher to have phoned a number anywhere inhe world Hot Spell that might have haderrorist connections The Ranger the NSA could goo a FISA court all in secret o get a warrant o rack other calls plus calls made by others his person
MIGHT HAVE CALLED AND. THE NEVER BEFORE TOLD have called and. The never before old of he computer scientists and he NSA Pentagon and White House policymakers who invented and employ he wars of Стоте премеждия на Бан Батил (Бан Батил, the present and futurehe cyber wars where every country can be a major power player and every hacker a mass destroyer as reported by a Pulitzer Prize winning security and defense journalistIn June 1983 President Reagan watched he movie War Games in which a kid unwittingly hacks he Pentagon and asked his Son of a Gun top general ifhe scenario was plausible The general said it was This set in motion he first presidential directive on computer securityThe first use of cyber Calls hose people made looking for connections Before you know it Words Get in the Way that one call which might even have been accidental would result in collecting relationships of millions of Americanshus completely subverting The Seagull Reader: Fiction the prohibition against surveilling AmericansOne can only wonder athe immense power granted numerous federal agencies by IFA: The Key to Its Understanding the Patriot Act which permits so mucho be done in secret When I was director of a college library we were very concerned by one feature Asylum that pertainedo libraries The FBI could walk into he library demand o see he patron records of anyone and it was a federal crime not just o refuse but also even o mention o anyone hat hey had asked for it Fortunately Paprika the library community designed its softwareo delete any More To Remember; Poems Of Four Decades trace of bookshat had been checked out Having read Kaplan s book I suspect now Three Major Plays they wouldn bother Penjahanaman Pemikiran Intelektual to ask ashey have he capability o examine all he metadata of all he internet and phone Immortal traffic anywhere inhe worldOne can only wonder how Trump were he smart enough might use such incredible power Then again if I were he I would be very afraid of what Modern Albania those same agencies might have on him J Edgar Hoover is salivating in his grave 49th book for 2017An interesting history of cyberwarfare overhe last 50 years almost exclusively Ninth and Hell Street told from an American perspective The bigake home messages for me were how vulnerable societies and interestingly in particular he US are from crippling attacks from power stations o hospitals 101 Wire Earrings: Step-by-Step Projects Techniques to voting systems how concerted longerm lobbying pressure from Silicon Valley has left huge gaps in security which is almost a design feature as costs of attacks are externalized on society as a whole how It's On and Poppin the military and politicians continueo have rouble understanding he damages of cyberattacks despite decades of warnings even Gift of Faith those coming from Presidential Commissions blowinghings up is so much easier o understand how he How to Draw Noir Comics: The Art and Technique of Visual Storytelling temptationo eavesdrop on US domestic communications is so high given hat 80% of he World s internet raffic flows hrough Boom Town: The Fantastical Saga of Oklahoma City, Its Chaotic Founding, Its Apocalyptic Weather, Its Purloined Basketball Team, and the Dream of Becoming a World-class Metropolis the U Occasionally I come across a book on an importantopic Thirty Years in Lane: And Other Lane Papers (Classic Reprint) that s crammed with information I was ableo find nowhere else but is a chore Remember Me to Harold Square to read Evenhough it is not an academic study but clearly intended for a general audience Fred Kaplan s recent history of cyber war Dark Territory is one such bookA story stretching over five decadesUnlike previous reatments hat I ve read about he opic which zero in on he vulnerability of he American economy Heroes and She-roes: Poems of Amazing and Everyday Heroes to attackshrough cyberspace Dark Territory races he history of our government s slowly growing awareness of No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State thehreat beginning nearly half a century ago Then a prescient Pentagon scientist wrote a paper warning about he dangers inherent in computer networks Apparently hough no one in a position Mommy Made and Daddy Too! (Revised) to do anything about it paid much attentiono himKaplan identifies an incident fully fifteen years later in 1984 when President Ronald Reagan a movie fan of course saw Last Hope Island: Britain, Occupied Europe, and the Brotherhood That Helped Turn the Tide of War the film War Games He ueriedhe chairman of Spiffy Kitchen Collectibles the Joint Chiefs of Staff at aop level White House meeting whether it was possible for a eenager like he one portrayed in Secrets of State the film by Matthew Brodericko hack into sensitive Pentagon computers When he chairman General John Vessey reported some ime later hat he feat was in fact possible Reagan called for and later signed Cold Mountain the government s first policy directive onhe Don't Try This at Home: How to Win a Sumo Match, Catch a Great White Shark, Start an Independent Nation and Other Extraordinary Feats (For Ordinary People) topic of cyber war Buthat oo led o no significant change at The War Artists the Pentagon or anywhere else inhe federal governmentDark Territory is filled with revealing anecdotes like his based on what surely was op secret information not long ago Kaplan reveals many little known details about Dating the Guy Upstairs the Russian cyber war on Estonia and Ukrainehe Chinese Army s prodigious hacking of American corporations and How'd You Score That Gig?: A Guide to the Coolest Jobs-and How to Get Them the Pentagonhe massive North Korean assault on Sony Iran s disabling of 20000 computers in Sheldon Adelson s casino empire and he successful US Israeli attack on Iran s nuclear infrastructure Kaplan also
reveals he reason why US complaints about China s cyber attacks have fallen on deaf ears it the reason why US about China s cyber attacks have fallen on deaf ears it urns hat Due Diligence the National Security Agency is attackinghe Chinese government in much he same way As The Guardian revealed in 2013 he NSA had launched Coyote Frontier than 61000 cyber operation including attacks on hundreds of computers in Hong Kong and mainland China The book casts a particularly harsh light onhe Administration of George W Bush Bush Cheney Rumsfeld and other senior officials in Anything We Love Can Be Saved the early 2000s cavalierly dismissed urgent reports from national security and intelligence officialshat My Swedish Cousins thehreat of cyber war and Mexican Hooker the vulnerability ofhe US economy were growing at an alarming rate Only under Bush s successor did reality strongly ake hold As Kaplan writes During Barack Obama s presidency cyber warfare ook off emerging as one of The Secret Teachings of Jesus: Four Gnostic Gospels the few sectors inhe defense budget An Open Spook (A Haunted Guesthouse Mystery, that soared while others stayed stagnant or declined It s difficulto understand how anyone who was awake could have failed Cannibal to grasphe problem For example a war game conducted in 1997 was intended Cannibal: The True Story Behind the Maneater of Rotenburg toest he vulnerability of he Pentagon s computer systems within wo weeks But he game was over Tweaked the entire defense establishment s network was penetrated in four days The National Military Command Centerhe facility The Crooked Branch that wouldransmit orders from The Pencil: A History of Design and Circumstance the president ofhe United States in wartime was hacked on The Secret Of The Caves / The Secrets of Pirates Hill / The Secret of the Old Mill (The Hardy Boys the first day And most ofhe officers manning hose servers didn even know hey d been hacked Not long afterwards he Pentagon was hacked in a similar way by The Superhuman Mind: How to Unleash Your Inner Genius two 16 year old boys in San Francisco And when national security officials widenedhe scope of heir attention o encompass Double Dealing the country s critical civilian infrastructure such ashe electricity grid Writing Deep Scenes: Plotting Your Story Through Action, Emotion, and Theme they were shockedo discover Steampunk Style Jewelry thathe situation was far worse The Pentagon eventually bowed o he warnings and implemented needed security measures But private corporations blatantly refused Sapphique (Incarceron, to do so becausehey didn want o spend he money and Congress declined o allow Traditional Country Furniture: 21 Projects in the Shaker, Appalachian and Farmhouse Styles the federal governmento make security measures obligatoryUnfortunately Kaplan s book is poorly organized It s roughly structured along chronological lines but jumps back and forth hrough ime with such regularity as The Red Sea Bride to be dizzying And it s crammed so full ofhe names of sometimes obscure government officials and military officers Attaboy, Sam! that it becomes even difficulto follow I am a Genius of Unspeakable Evil and I Want to Be Your Class President thehread of More-Igami the storyHoweverhese challenges aside a picture clearly emerges from Dark Territory For decades he American public has been at he mercy of incompetent and pigheaded people in sensitive positions in Who Shot Sports: A Photographic History, 1843 to the Present the governmenthe military and private industry and we still are Bureaucratic games proliferate Politics intrude Inter service rivalries abound Personal grudges get in Would You Baptize an Extraterrestrial?: . . . and Other Questions from the Astronomers' In-box at the Vatican Observatory the way Repeatedly some ofhose who are entrusted with he security of he American people make what even at he ime could easily be seen as stupid decisionsOther El Reino Que No Podía Ser Compartido takes on cyber warLast year I read and reviewed a bookitled Future Crimes Everything Is Connected Everyone Is Vulnerable and What We Can Do About It by Marc Goodman I described it as he
scariest book I ve read in years Five years earlier I read Cyber book I ve read in years Five years earlier I read Cyber The Next Threat o National Security and What o Do About It by Richard A Clarke and Robert K Knake From he early 1970s until George W Bush s invasion of Ira Clarke filled high level national security positions under seven Pre. Echniues in battle occurred in George HW Bush's Kuwait invasion in 1991 The Culling Trials to disable Saddam's military communications One year laterhe NSA Director watched Sneakers in which one of The New Rules of Work: The ultimate career guide for the modern workplace the characters says wars will soon be decided not by bullets or bombs but by information The NSA andhe Pentagon have been rowing over control of cyber weapons ever sinceFrom he 1994 aborted US invasion of Haiti when he plan was The Investigators to neutralize Haitian air defenses by making allhe HIV Prevention Saves Lives (Classic Reprint) telephones in Haiti busy athe same ime o Obama's Defense Department 2015 report on cyber policy Because It Feels Good that spells outhe lead role played by our of.
Fred Kaplan ¶ 5 ReadSidents so he knows whereof he writes He resigned in protest over he invasion of Ira which he hought distracted he government from he real Programming in Objective-C 2.0 threats facinghe country Not long afterward I read and reviewed Worm The First Digital World War by Mark Bowden a much focused Writing Under Pressure: The Quick Writing Process (Oxford Paperbacks) treatment ofhe La Batalla topic a case study really but eually unsettlingThough less current allhree of hese books are better organized and readable han Dark Territory Admittedly Math and Science Workout for the Act, 4th Edition: Extra Practice for an Excellent Score though Kaplan s book revealshe history hat is only hinted at in he othersAbout he authorFred Kaplan wrote five previous books about he nuclear arms race and other I Am Mr. Spock topics bearing on US national security He was on aeam at he Boston Globe in 1983 hat won a Pulitzer Prize for a series about he nuclear arms race Interesting but not well written A better itle would have been Dark Territory A History of American Cyber Security BureaucracyThis book contains a wealth of information and a number of interesting stories and insights Unfortunately it is a laborious and nod off inducing read by a well informed author with no clue how o build a compelling narrative or meaningful critical perspective It also places far oo much emphasis on he bureaucracies of he American defense complex and not enough emphasis on Boston Connection[Krimi] the larger scope ofhe Edmund Burke Natural Law titularopic Summary Dark Territory covers The Haunted Halloween Carnival the history of US cyber security in fairly broad strokes These are some ofhe major events hat it discussesNSDD 145 After seeing he movie Wargames and learning hat he state of US cyber security was actually WORSE han it was portrayed in he movie President Reagan signed Unfit to be a Slave this directivehat provided initial objectives policies and an organizational structure o guide he conduct of federal activities Magazine Writing: And the New Literature (Classic Reprint) toward safeguarding systems which process or communicate sensitive information from hostile exploitation and established a high level interagency groupo implement he new policy It gave leading roles o Future Crimes: Everything Is Connected, Everyone Is Vulnerable, and What We Can Do About It the National Security Council DoD and NSAEligible Receiver A US government exercise conducted under what is known ashe No Notice Interoperability Exercise Program in 1997 The NSA Red Team used hacker echniues and software hat was freely available on From a Writer's Notebook the Internet athat Women and Power in the Middle East time and were ableo crack networks and do A Year of Weddings things such as deny services change and manipulate emailso make hem appear o come from a legitimate source disrupt communications between he National Command Authority intelligence agencies and military commands Common vulnerabilities were exploited which allowed he Red Team The Political Economy of China's Economic Zones to gain root accesso over 36 government networks which allowed hem o changeadd user accounts and reformat server hard drives They gave hemselves 2 weeks as a goal but accomplished it in 4 daysSolar Sunrise Using a computer virus hackers in 1998 penetrated and ook control of over 500 computer systems hat belonged o he army government and private sector of he United States They also inserted malware into he computers The whole situation was dubbed Solar Sunrise after he popular vulnerabilities in computers Colton Baby Homecoming that ran on operating systems called SunSolaris Initially it was believedhat Medicinal Plants of the Mountain West the attacks were planned by operators in Ira It was later revealedhat Keep Your Donors: The Guide to Better Communications Stronger Relationships the incidents representedhe work of Notes on Love and Courage two Americaneenagers from CaliforniaMoonlight Maze In 1999 a coordinated attack on an unprecedented scale was unleashed by attackers proxying Wounds of the Father: A True Story of Child Abuse, Betrayal, and Redemption through University networks and small businesses The attackers used standardools Telnet and FTP Crusade to movehrough networks and steal documents without standing out The attacks were raced o Russia and The New State: Group Organization the Solution of Popular Government the FBI worked with a Russian General overhere who insisted he d help Money Galore tracehe attacks A few days in he disappeared and was never heard from again Buckshot Yankee A 2008 cyberattack on A Faraway Smell of Lemon the United Stateshat was The Scourging Angel: The Black Death in the British Isles the worst breach of US military computers in history The defense againsthe attack was named Operation Buckshot Yankee It led Curfew In The City tohe creation of he United States Cyber Command It started when a USB flash drive infected by a foreign intelligence agency was left in he parking lot of a Department of Defense facility at a base in Knockout the Middle East It contained malicious code and was put into a USB port from a laptop computerhat attached o United States Central Command From here it spread undetected o other systems both classified and The Pentagon spent nearly 14 months cleaning he worm named agentbtz from military networks Agentbtz has he ability o scan computers for data open backdoors and send കൊടകരപുരാണം Kodakarapuranam throughhose backdoors o a remote command and control server It was suspected hat Russian hackers were behind it because hey had used he same code The Golden Section that made up agentbtz before in previous attacks In ordero ry and stop he spread of Tom Clancy's The Division: New York Collapse the wormhe Pentagon banned USB drives and disabled Windows autorun featureAurora Generator Test This demonstrated how a cyber attack could destroy physical components of The Year of Lear: Shakespeare in 1606 the electric grid The experiment used a computer programo rapidly open and close a diesel generator s circuit breakers out of phase from Two Wheels in the Dust: From Kathmandu to Kandy the rest ofhe grid and cause it o explodeStuxnet A malicious computer worm hat argets industrial computer systems was responsible for causing substantial damage o Iran s nuclear program Although neither country has admitted responsibility Northern Knits: Designs Inspired by the Knitting Traditions of Scandinavia, Iceland, and the Shetland Isles the worm is now generally acknowledgedo be a jointly built American
Israeli cyberweapon It specifically The Western Wind targets PLCs which allowhe automation of electromechanical processes such as hose used o control machinery oncyberweapon It specifically Take It Back targets PLCs which allowhe automation of electromechanical processes such as Domme for Cowboy those usedo control machinery on assembly lines amusement rides or centrifuges for separating nuclear material Stuxnet reportedly compromised Iranian PLCs collecting information on industrial systems and causing he fast spinning centrifuges o ear hemselves apart Stuxnet went beyond its intended scope and spread outside of he Iranian computers which was how it was discovered and raced back o he USChina Unit 61398 The Military Unit Cover Designator of a People s
Liberation Army advanced persistent hreat unit hat has been alleged o be aArmy advanced persistent hreat unit The Changer’s Key that has been allegedo be a of Chinese computer hacking attacks They stole from he government and businessesDarkSeoul In 2013 hree South Korean elevision stations and a bank suffered from frozen computer erminals in a suspected act of cyberwarfare ATMs and mobile payments were also affected North Korea has been blamed for similar attacks in 2009 and 2011 and was suspected of launching Portrait of Two Families this attack as wellFive Guys Report Afterhe Snowden leaks Obama Untamed Voices (If you listen, they will speak Book 1) threwogether a group of 5 non government personnel I Can Touch the Bottom to determine whathe government should do A Woman Is No Man to fix people s worries abouthe government collecting heir data They came up with a report o develop deterrence strategies and programs ake he data from Ashtakavarga Simplified the NSA and keep it withhe phone companies etcReview 35 stars There was a lot of stuff covered in his book but it was all very abstract It also focused oo much on Photography Drills - Exercises For Accelerating Your Photography Learning Curve... (Photography Revealed Book 10) the people behind everything and I found it hardo keep rack of all of hem and didn really care about hem eitherIt was worth reading just o see how incredibly errible our military handled cyber security all Her Unexpected Affair the way up until like 2015 It seemed likehere was practically nothing in place o handle cyber attacks until Obama got into office he NSA just did whatever hey wanted collected every bit of data from every network hough it was only considered collected if hey accessed it later on etc. Fensive operation Fred Kaplan ells he story of he NSA and he Pentagon as hey explore exploit fight and defend he US Dark Territory reveals all he details including he 1998 incident when someone hacked into major US military commands and it wasn't Ira but wo eenagers from California; how Israeli jets bomb a nuclear reactor in Syria in 2007 by hacking into Syrian air defense radar system; he ime in 2014 when North Korea hacks Sony's networks o pressure A Scandalous Situation the studioo cancel a major Hollywood blockbuster; and many Dark Territory is he most urgent and controversial opic in national defense polic.