Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan
By Worth Books
()
About this ebook
Crafted and edited with care, Worth Books set the standard for quality and give you the tools you need to be a well-informed reader.
This short summary and analysis of Dark Territory includes:
- Historical context
- Chapter-by-chapter overviews
- Profiles of the main characters
- Detailed timeline of key events
- Important quotes
- Fascinating trivia
- Glossary of terms
- Supporting material to enhance your understanding of the original work
Dark Territory traces the secret history of US intelligence in the Internet age and describes how cyberwarfare has evolved since the 1980s. Pulitzer Prize–winning journalist and Slate columnist Fred Kaplan reveals the major players, events, and technologies that have transformed the nature of war from being about bombs and bullets to bits and bytes.
Although Edward Snowden brought it into the public spotlight, the National Security Agency’s operations have been involved in US and international policy for years through secret operations, espionage, and counterintelligence. Dark Territory is the covert and dangerous history of a war very few knew was being waged that continues to shape our future.
The summary and analysis in this ebook are intended to complement your reading experience and bring you closer to a great work of nonfiction.
Worth Books
Worth Books’ smart summaries get straight to the point and provide essential tools to help you be an informed reader in a busy world, whether you’re browsing for new discoveries, managing your to-read list for work or school, or simply deepening your knowledge. Available for fiction and nonfiction titles, these are the book summaries that are worth your time.
Read more from Worth Books
Summary and Analysis of Victoria: The Queen: An Intimate Biography of the Woman Who Ruled an Empire: Based on the Book by Julia Baird Rating: 0 out of 5 stars0 ratingsSummary and Analysis of The Handmaid's Tale: Based on the Book by Margaret Atwood Rating: 5 out of 5 stars5/5The American Reader: A Brief Guide to the Declaration of Independence, the Constitution of the United States, and the Bill of Rights Rating: 0 out of 5 stars0 ratingsSummary and Analysis of The Sixth Extinction: An Unnatural History: Based on the Book by Elizabeth Kolbert Rating: 0 out of 5 stars0 ratingsSummary and Analysis of Grit: The Power of Passion and Perseverance: Based on the Book by Angela Duckworth Rating: 5 out of 5 stars5/5Summary and Analysis of Man's Search for Meaning: Based on the Book by Victor E. Frankl Rating: 4 out of 5 stars4/5Summary and Analysis of To Kill a Mockingbird: Based on the Book by Harper Lee Rating: 0 out of 5 stars0 ratingsSummary and Analysis of The Immortal Life of Henrietta Lacks: Based on the Book by Rebecca Skloot Rating: 5 out of 5 stars5/5Summary and Analysis of Thinking, Fast and Slow: Based on the Book by Daniel Kahneman Rating: 4 out of 5 stars4/5Summary and Analysis of 1984: Based on the Book by George Orwell Rating: 5 out of 5 stars5/5Summary and Analysis of Midnight in the Garden of Good and Evil: A Savannah Story: Based on the Book by John Berendt Rating: 0 out of 5 stars0 ratingsSummary and Analysis of It Can't Happen Here: Based on the Book by Sinclair Lewis Rating: 0 out of 5 stars0 ratingsSummary and Analysis of Profiles in Courage: Based on the Book by John F. Kennedy Rating: 5 out of 5 stars5/5Summary and Analysis of Mindset: The New Psychology of Success: Based on the Book by Carol S. Dweck, PhD Rating: 4 out of 5 stars4/5Summary and Analysis of The Signal and the Noise: Why So Many Predictions Fail—but Some Don't: Based on the Book by Nate Silver Rating: 0 out of 5 stars0 ratingsSummary and Analysis of Outliers: The Story of Success: Based on the Book by Malcolm Gladwell Rating: 3 out of 5 stars3/5Summary and Analysis of The Kite Runner: Based on the Book by Khaled Hosseini Rating: 0 out of 5 stars0 ratings
Related to Summary and Analysis of Dark Territory
Related ebooks
Summary of Kim Zetter's Countdown to Zero Day Rating: 0 out of 5 stars0 ratingsDark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Nation-State Cyber Offensive Capabilities: an in-depth look into a multipolar dimension Rating: 0 out of 5 stars0 ratingsSpies for Hire: The Secret World of Intelligence Outsourcing Rating: 3 out of 5 stars3/5The Coming Cyber War: What Executives, the Board, and You Should Know Rating: 0 out of 5 stars0 ratingsCyberspace in Peace and War, Second Edition Rating: 0 out of 5 stars0 ratingsThe Invisible Soldiers: How America Outsourced Our Security Rating: 4 out of 5 stars4/5Cyber Warfare: Its Implications on National Security Rating: 0 out of 5 stars0 ratingsSummary of Christian Brose's The Kill Chain Rating: 1 out of 5 stars1/5Cyber Crimes: History of World's Worst Cyber Attacks Rating: 0 out of 5 stars0 ratingsSummary and Analysis of Black Flags: The Rise of ISIS: Based on the Book by Joby Warrick Rating: 3 out of 5 stars3/5Insider Threat: Prevention, Detection, Mitigation, and Deterrence Rating: 5 out of 5 stars5/5Stay Safe!: A Basic Guide to Information Technology Security Rating: 0 out of 5 stars0 ratingsYou CAN Stop Stupid: Stopping Losses from Accidental and Malicious Actions Rating: 0 out of 5 stars0 ratingsYour Data, Their Billions: Unraveling and Simplifying Big Tech Rating: 4 out of 5 stars4/5Covert Military Strategy The Theory Of War Rating: 0 out of 5 stars0 ratingsInformation Warfare: The Lost Tradecraft Rating: 0 out of 5 stars0 ratingsThe Tao of Open Source Intelligence Rating: 3 out of 5 stars3/5Summary of Sean McFate's The New Rules of War Rating: 0 out of 5 stars0 ratingsHackable: How to Do Application Security Right Rating: 5 out of 5 stars5/5Protecting Our Future, Volume 1: Educating a Cybersecurity Workforce Rating: 0 out of 5 stars0 ratingsIf It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Introduction to Cyber-Warfare: A Multidisciplinary Approach Rating: 5 out of 5 stars5/5Strategic Intelligence for American National Security: Updated Edition Rating: 0 out of 5 stars0 ratingsNew Zealand National Security: Challenges, Trends and Issues Rating: 0 out of 5 stars0 ratingsAnatomy of a cyberattack Rating: 0 out of 5 stars0 ratings
Security For You
How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5IAPP CIPP / US Certified Information Privacy Professional Study Guide Rating: 0 out of 5 stars0 ratingsCompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Make Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5How I Rob Banks: And Other Such Places Rating: 0 out of 5 stars0 ratingsCodes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHow to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Hacking For Dummies Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsEthical Hacking 101 - How to conduct professional pentestings in 21 days or less!: How to hack, #1 Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Hands on Hacking: Become an Expert at Next Gen Penetration Testing and Purple Teaming Rating: 3 out of 5 stars3/5Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5Ultimate Guide for Being Anonymous: Hacking the Planet, #4 Rating: 5 out of 5 stars5/5
Reviews for Summary and Analysis of Dark Territory
0 ratings0 reviews
Book preview
Summary and Analysis of Dark Territory - Worth Books
Contents
Context
Overview
Summary
Timeline
Cast of Characters
Direct Quotes and Analysis
Trivia
What’s That Word?
Critical Response
About Fred Kaplan
For Your Information
Bibliography
Copyright
Context
Dark Territory, a history of cyber warfare and US national security, was released at an apropos time. It was 2016, the middle of the contentious Trump–Clinton presidential election, and hacking was at the forefront of the national conversation. Hillary Clinton’s use of a private email server had come under heavy criticism, and reports were beginning to emerge that the Democratic National Committee’s system had been hacked. Soon, an email dump of those private communications made revelations public that began to shift the election—and, some say, handed the surprising victory to Donald Trump.
Beyond politics, Dark Territory has expanded on a conversation already happening in boardrooms and corner offices around the world. Hacking has cost numerous corporations millions of dollars in ruined equipment and lost trade secrets, to say nothing of consumer confidence. This has in turn given rise to the massive and growing cyber-security industry, one whose actions remain as opaque as those of the hackers. Dark Territory sheds light on the dangers, risks, and rewards of cyber attacks in the age of total Internet connectivity.
Overview
Cyber warfare, or war waged over the Internet, is a global phenomenon. Dark Territory is a definitive account of its history, how it functions in our current age, and why it will continue to do so for many years to come. Tracing the secret history of US intelligence in the Internet age, author Fred Kaplan details how cyber warfare has evolved since the 1980s, revealing the major players, events, and technologies that have transformed the weapons of war from bombs and bullets to bits and bytes. From early cyber attacks in Kosovo that fooled radar operators into missing their targets to the fight to identify Russian hackers penetrating government systems, Dark Territory contains the history of espionage in the digital age.
Whistleblower Edward Snowden may have put the National Security Agency (NSA) into the spotlight, but the reality is that this organization has affected US and international policy for years,