David sanger the perfect weapon steven
The government was often paralyzed, unable to threaten the use of cyberweapons because America was so vulnerable to crippling attacks on its own networks of banks, utilities, and government agencies. Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, New York Times national security correspondent David Sanger—who broke the story of Olympic Games in his previous book—reveals a world coming face-to-face with the perils of technological revolution.
The Perfect Weapon is the dramatic story of how great and small powers alike slipped into a new era of constant sabotage, misinformation, and fear, in which everyone is a target. The View from Soviet Literature. Kennan at Honoring Senator Ben Cardin. Wed Jan 29 In person Online. Thu Jan 30 Online.
David sanger the perfect weapon steven
June 26, The role of private companies is interwoven throughout the book. Sanger illuminates the complex debates concerning personal privacy and electronic device security. Sanger provides an insightful history of a time when government collaboration with industry was easier and explains why it is dysfunctional today. Sanger advocates for greater cyber transparency on several fronts.
How does a nation begin to discuss setting international rules about the use of weapons whose existence and use are not acknowledged? Additionally, how do institutions defend against threats if the intelligence community will not share information of a known threat, its details, and reliability, for fear of compromising sources? The warning went unheeded, and the DNC fumbled the response.
Despite eras of timidity, especially under President Obama, the US has set many cyberattack precedents. The descriptions of Stuxnet and Olympic Games are riveting and the results satisfying to an American reader. Sanger also explains how the US has seen its cyber weapons stolen and turned back on it not so satisfying. Sanger states that ten years will be required for the United States to develop a defense that is adequate for cyber deterrence.
But this argument is underdeveloped compared to other issues in the book and needed greater detail to make such a long timeline convincing. Perhaps the public sector — private sector relationship in the United States could be expanded to encompass national cyber security standards such as regulations, incentives, and penalties for non- compliance.
The author provides recommendations, mostly relating to cyber transparency. Weaker states such a North Korea currently do not fear a US response to egregious cyber-attacks. Public attribution and responses to attacks are also required for an effective cyber policy. Faster technologies and the use of artificial intelligence will increase the destructive power of cyber-attacks.
The author believes that cyberwar arms control agreements must come out of the shadows and that the days where only nations with conventional weapons could threaten the United States are gone. His primary research interests are the geopolitical challenges and security threats around the Black Sea. He hopes to rejoin NATOs efforts to predict and prepare for emerging threats upon his graduation from American University.