Error loading page.
Try refreshing the page. If that doesn't work, there may be a network issue, and you can use our self test page to see what's preventing the page from loading.
Learn more about possible network issues or contact support for more help.

@War

The Rise of the Military-Internet Complex

ebook
1 of 1 copy available
1 of 1 copy available
An informative study of how corporations, governments, and individuals are perfecting the ability to monitor and sabotage Internet infrastructure.
The wars of the future are already being fought today. The United States military currently views cyberspace as the "fifth domain" of warfare (alongside land, air, sea, and space), and the Department of Defense, the National Security Agency, and the CIA all field teams of hackers who can, and do, launch computer virus strikes against enemy targets. As recent revelations have shown, government agencies are joining with tech giants like Google and Facebook to collect vast amounts of information, and the military has also formed a new alliance with tech and finance companies to patrol cyberspace. Shane Harris offers a deeper glimpse into this partnership than we have ever seen before, and he explains what the new cyber security regime means for all of us who spend our daily lives bound to the Internet—and are vulnerable to its dangers.
  • Creators

  • Publisher

  • Release date

  • Formats

  • Languages

  • Reviews

    • Publisher's Weekly

      September 8, 2014
      Cyber-espionage is the “single most productive means of gathering information about our country’s adversaries,” writes Harris (The Watchers: The Rise of America’s Surveillance State), senior writer for Foreign Policy, in this unnerving exposé. After 9/11, the National Security Administration (NSA), the nation’s global information-gathering agency, submitted a wish list to the Bush administration. It was approved and the “military-Internet complex was born.” According to Harris, electronic eavesdropping was fundamental to 2007’s Iraq surge and the NSA located Osama bin Laden through spyware planted in his operatives’ mobile phones. On the other hand, Chinese hackers have stolen important military and industrial secrets, revealing how adversaries could sabotage computer-dependent infrastructure. Warning that we remain staggeringly vulnerable, America’s cyberdefenders have persuaded an obliging Congress to provide an avalanche of money and to ease privacy laws. Readers will squirm as they learn how every communications enterprise (Google, AT&T, Verizon, Facebook) cooperates with the national security establishment. Harris delivers a convincing account of the terrible cyberdisasters that loom, and the intrusive nature of the fight to prevent them. Agent: Tina Bennett, William Morris Endeavor.

    • Library Journal

      June 1, 2014

      According to Harris, the battlefield of the future is cyberspace. In fact, the Department of Defense, the National Security Agency, and the CIA all boast hackers able to launch computer virus strikes against enemy targets; cyberwarfare helped advance our cause in Iraq. Since Harris is a senior writer at Foreign Policy magazine and winner of the Gerald R. Ford Prize for Distinguished Reporting on National Defense, we need to listen. The idea of links between the military and companies like Google and Apple is unsettling.

      Copyright 2014 Library Journal, LLC Used with permission.

    • Library Journal

      November 1, 2014

      It seems as if nearly every day brings new reports about groups hacking into vital government networks or criminals stealing personal information. There are also concerns about the government's collection of data. This fluid state of cybercrime and cyberwarfare, with government-sanctioned hackers launching cyberattacks at enemies, is a significant issue for the nation's economy and security. Taking a cue from President Eisenhower's Farewell Address of January 1961, journalist Harris (Foreign Policy magazine) reveals how the military and law enforcement branches have not only established agencies to work in this specialized field but have also gotten private companies to do much of the development and data gathering. There is a real concern that these companies, whose resources are definitely needed, are not well supervised by the government and may end up influencing operations more for financial gain than security reasons. The writing seems to reflect tensions between a need to discuss and counter a national security threat and disgust that so much of this is being done secretly and with private businesses. The research resources consist of articles, books, and government publications, supplemented by many interviews with experts in this subject. This book complements the author's previous work, The Watchers: The Rise of America's Surveillance State. VERDICT Cybercrime and warfare is a hot topic for the general public as well as students and faculty, so this should be considered for all readers. [See Prepub Alert, 5/12/14.]--Daniel Blewett, Coll. of DuPage Lib., Glen Ellyn, IL

      Copyright 2014 Library Journal, LLC Used with permission.

Formats

  • Kindle Book
  • OverDrive Read
  • EPUB ebook

Languages

  • English

Loading