Summary and Analysis of Dark Territory: The Secret History of Cyber War: Based on the Book by Fred Kaplan
By Worth Books
()
About this ebook
Crafted and edited with care, Worth Books set the standard for quality and give you the tools you need to be a well-informed reader.
This short summary and analysis of Dark Territory includes:
- Historical context
- Chapter-by-chapter overviews
- Profiles of the main characters
- Detailed timeline of key events
- Important quotes
- Fascinating trivia
- Glossary of terms
- Supporting material to enhance your understanding of the original work
Dark Territory traces the secret history of US intelligence in the Internet age and describes how cyberwarfare has evolved since the 1980s. Pulitzer Prize–winning journalist and Slate columnist Fred Kaplan reveals the major players, events, and technologies that have transformed the nature of war from being about bombs and bullets to bits and bytes.
Although Edward Snowden brought it into the public spotlight, the National Security Agency’s operations have been involved in US and international policy for years through secret operations, espionage, and counterintelligence. Dark Territory is the covert and dangerous history of a war very few knew was being waged that continues to shape our future.
The summary and analysis in this ebook are intended to complement your reading experience and bring you closer to a great work of nonfiction.
Worth Books
Worth Books’ smart summaries get straight to the point and provide essential tools to help you be an informed reader in a busy world, whether you’re browsing for new discoveries, managing your to-read list for work or school, or simply deepening your knowledge. Available for fiction and nonfiction titles, these are the book summaries that are worth your time.
Read more from Worth Books
Summary and Analysis of Guns, Germs, and Steel: The Fates of Human Societies: Based on the Book by Jared Diamond Rating: 4 out of 5 stars4/5The American Reader: A Brief Guide to the Declaration of Independence, the Constitution of the United States, and the Bill of Rights Rating: 0 out of 5 stars0 ratingsSummary and Analysis of The Handmaid's Tale: Based on the Book by Margaret Atwood Rating: 5 out of 5 stars5/5Summary and Analysis of The Immortal Life of Henrietta Lacks: Based on the Book by Rebecca Skloot Rating: 5 out of 5 stars5/5Summary and Analysis of Grit: The Power of Passion and Perseverance: Based on the Book by Angela Duckworth Rating: 5 out of 5 stars5/5Summary and Analysis of To Kill a Mockingbird: Based on the Book by Harper Lee Rating: 0 out of 5 stars0 ratingsSummary and Analysis of The Sixth Extinction: An Unnatural History: Based on the Book by Elizabeth Kolbert Rating: 0 out of 5 stars0 ratingsSummary and Analysis of Man's Search for Meaning: Based on the Book by Victor E. Frankl Rating: 4 out of 5 stars4/5Summary and Analysis of It Can't Happen Here: Based on the Book by Sinclair Lewis Rating: 0 out of 5 stars0 ratingsSummary and Analysis of Mindset: The New Psychology of Success: Based on the Book by Carol S. Dweck, PhD Rating: 4 out of 5 stars4/5Summary and Analysis of Thinking, Fast and Slow: Based on the Book by Daniel Kahneman Rating: 4 out of 5 stars4/5Summary and Analysis of Midnight in the Garden of Good and Evil: A Savannah Story: Based on the Book by John Berendt Rating: 0 out of 5 stars0 ratingsSummary and Analysis of Profiles in Courage: Based on the Book by John F. Kennedy Rating: 5 out of 5 stars5/5Summary and Analysis of The Signal and the Noise: Why So Many Predictions Fail—but Some Don't: Based on the Book by Nate Silver Rating: 0 out of 5 stars0 ratingsSummary and Analysis of 1984: Based on the Book by George Orwell Rating: 5 out of 5 stars5/5Summary and Analysis of Outliers: The Story of Success: Based on the Book by Malcolm Gladwell Rating: 3 out of 5 stars3/5Summary and Analysis of The Kite Runner: Based on the Book by Khaled Hosseini Rating: 0 out of 5 stars0 ratings
Related to Summary and Analysis of Dark Territory
Related ebooks
Summary of Kim Zetter's Countdown to Zero Day Rating: 0 out of 5 stars0 ratingsDark Territory: The Secret History of Cyber War Rating: 4 out of 5 stars4/5Nation-State Cyber Offensive Capabilities: an in-depth look into a multipolar dimension Rating: 0 out of 5 stars0 ratingsEnemies of Intelligence: Knowledge and Power in American National Security Rating: 0 out of 5 stars0 ratingsZero Day: The Threat In Cyberspace Rating: 4 out of 5 stars4/5@War: The Rise of the Military-Internet Complex Rating: 4 out of 5 stars4/5Spies for Hire: The Secret World of Intelligence Outsourcing Rating: 3 out of 5 stars3/5The Coming Cyber War: What Executives, the Board, and You Should Know Rating: 0 out of 5 stars0 ratingsCyberspace in Peace and War, Second Edition Rating: 0 out of 5 stars0 ratingsAnatomy of a cyberattack Rating: 0 out of 5 stars0 ratingsIf It's Smart, It's Vulnerable Rating: 4 out of 5 stars4/5Defence Forces Review 2011 Rating: 5 out of 5 stars5/5Your Data, Their Billions: Unraveling and Simplifying Big Tech Rating: 4 out of 5 stars4/5Insider Threats Rating: 5 out of 5 stars5/5Summary of Sean McFate's The New Rules of War Rating: 0 out of 5 stars0 ratingsThe Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsBreaking and Entering: the extraordinary story of a hacker called ‘Alien’ Rating: 3 out of 5 stars3/5Cyber Warfare: Its Implications on National Security Rating: 0 out of 5 stars0 ratingsThe Art of Attack: Attacker Mindset for Security Professionals Rating: 0 out of 5 stars0 ratingsCyber Security and Policy: A substantive dialogue Rating: 0 out of 5 stars0 ratingsThe Hacker's Zibaldone Rating: 0 out of 5 stars0 ratingsInsider Threat: A Guide to Understanding, Detecting, and Defending Against the Enemy from Within Rating: 0 out of 5 stars0 ratingsTempting Fate: Why Nonnuclear States Confront Nuclear Opponents Rating: 0 out of 5 stars0 ratingsCyber Security Policy Guidebook Rating: 0 out of 5 stars0 ratingsNot with a Bug, But with a Sticker: Attacks on Machine Learning Systems and What To Do About Them Rating: 0 out of 5 stars0 ratingsSummary of Christian Brose's The Kill Chain Rating: 1 out of 5 stars1/5Information Warfare: The Lost Tradecraft Rating: 0 out of 5 stars0 ratings
Security For You
Cybersecurity: The Beginner's Guide: A comprehensive guide to getting started in cybersecurity Rating: 5 out of 5 stars5/5Practical Lock Picking: A Physical Penetration Tester's Training Guide Rating: 5 out of 5 stars5/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5How to Become Anonymous, Secure and Free Online Rating: 5 out of 5 stars5/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Hacking : The Ultimate Comprehensive Step-By-Step Guide to the Basics of Ethical Hacking Rating: 5 out of 5 stars5/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Mike Meyers' CompTIA Security+ Certification Guide, Third Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5CompTIA Security+ Study Guide: Exam SY0-601 Rating: 5 out of 5 stars5/5The Art of Intrusion: The Real Stories Behind the Exploits of Hackers, Intruders and Deceivers Rating: 4 out of 5 stars4/5The Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsHacking: Ultimate Beginner's Guide for Computer Hacking in 2018 and Beyond: Hacking in 2018, #1 Rating: 4 out of 5 stars4/5Hacking For Dummies Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5Wireless Hacking 101 Rating: 4 out of 5 stars4/5CompTIA Network+ Certification Guide (Exam N10-008): Unleash your full potential as a Network Administrator (English Edition) Rating: 0 out of 5 stars0 ratingsMake Your Smartphone 007 Smart Rating: 4 out of 5 stars4/5Mike Meyers CompTIA Security+ Certification Passport, Sixth Edition (Exam SY0-601) Rating: 5 out of 5 stars5/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5CISSP Study Guide Rating: 4 out of 5 stars4/5How to Hack Like a Pornstar Rating: 5 out of 5 stars5/5Stealing The Network: How to Own the Box Rating: 4 out of 5 stars4/5Codes and Ciphers - A History of Cryptography Rating: 4 out of 5 stars4/5CompTIA Network+ Review Guide: Exam N10-008 Rating: 0 out of 5 stars0 ratingsCybersecurity for Beginners : Learn the Fundamentals of Cybersecurity in an Easy, Step-by-Step Guide: 1 Rating: 0 out of 5 stars0 ratings
Reviews for Summary and Analysis of Dark Territory
0 ratings0 reviews
Book preview
Summary and Analysis of Dark Territory - Worth Books
Contents
Context
Overview
Summary
Timeline
Cast of Characters
Direct Quotes and Analysis
Trivia
What’s That Word?
Critical Response
About Fred Kaplan
For Your Information
Bibliography
Copyright
Context
Dark Territory, a history of cyber warfare and US national security, was released at an apropos time. It was 2016, the middle of the contentious Trump–Clinton presidential election, and hacking was at the forefront of the national conversation. Hillary Clinton’s use of a private email server had come under heavy criticism, and reports were beginning to emerge that the Democratic National Committee’s system had been hacked. Soon, an email dump of those private communications made revelations public that began to shift the election—and, some say, handed the surprising victory to Donald Trump.
Beyond politics, Dark Territory has expanded on a conversation already happening in boardrooms and corner offices around the world. Hacking has cost numerous corporations millions of dollars in ruined equipment and lost trade secrets, to say nothing of consumer confidence. This has in turn given rise to the massive and growing cyber-security industry, one whose actions remain as opaque as those of the hackers. Dark Territory sheds light on the dangers, risks, and rewards of cyber attacks in the age of total Internet connectivity.
Overview
Cyber warfare, or war waged over the Internet, is a global phenomenon. Dark Territory is a definitive account of its history, how it functions in our current age, and why it will continue to do so for many years to come. Tracing the secret history of US intelligence in the Internet age, author Fred Kaplan details how cyber warfare has evolved since the 1980s, revealing the major players, events, and technologies that have transformed the weapons of war from bombs and bullets to bits and bytes. From early cyber attacks in Kosovo that fooled radar operators into missing their targets to the fight to identify Russian hackers penetrating government systems, Dark Territory contains the history of espionage in the digital age.
Whistleblower Edward Snowden may have put the National Security Agency (NSA) into the spotlight, but the reality is that this organization has affected US and international policy for years,