Summary of David E. Sanger's The Perfect Weapon
By IRB Media
()
About this ebook
Please note: This is a companion version & not the original book. Book Preview:
#1 In 2012, I met with Michael Morell, the deputy director of the CIA, to discuss a sensitive story the Times was preparing to publish. I knew that the meeting would be difficult, as the US government was not yet ready to discuss the consequences of its decision to use cyberweapons against another state in peacetime.
#2 I had come to hear about which details of the Olympic Games story concerned Morell and his colleagues, and they were preparing to ask the Times to withhold them, lest we tip off other targets of ongoing operations.
#3 The Obama administration was extremely secretive about its use of cyberweapons, and it was unclear how the public should feel about them. But there was no backtracking. When Michael Hayden, who had been central to the early days of America’s experimentation with cyberweapons, said that the Stuxnet code had the whiff of August 1945 about it, he was making clear that a new era had dawned.
#4 Hayden’s insight into the game-changing nature of cyber conflict began in 1998, when he was assigned to San Antonio, Texas, as the commander of the Air Intelligence Agency. He remembered watching in wonder as members of the staff disabled remote workstations and used electronic-warfare techniques to fool a radarscope.
IRB Media
With IRB books, you can get the key takeaways and analysis of a book in 15 minutes. We read every chapter, identify the key takeaways and analyze them for your convenience.
Read more from Irb Media
Summary of David R. Hawkins's Letting Go Rating: 4 out of 5 stars4/5Summary of Jessie Inchauspe's Glucose Revolution Rating: 5 out of 5 stars5/5Summary of Tiago Forte's Building a Second Brain Rating: 4 out of 5 stars4/5Summary of Dr. Mindy Pelz's The Menopause Reset Rating: 3 out of 5 stars3/5Summary of Mark Wolynn's It Didn't Start with You Rating: 4 out of 5 stars4/5Summary of Joe Dispenza's Breaking the Habit of Being Yourself Rating: 4 out of 5 stars4/5Summary of Anna Lembke's Dopamine Nation Rating: 4 out of 5 stars4/5The Untethered Soul by Michael A. Singer | Key Takeaways, Analysis & Review: The Journey Beyond Yourself Rating: 4 out of 5 stars4/5Summary of J.L. Collins's The Simple Path to Wealth Rating: 5 out of 5 stars5/5Summary of Al Brooks's Trading Price Action Trends Rating: 5 out of 5 stars5/5Summary of Ryan Daniel Moran's 12 Months to $1 Million Rating: 5 out of 5 stars5/5Summary of Lindsay C. Gibson's Adult Children of Emotionally Immature Parents Rating: 5 out of 5 stars5/5Summary of James Nestor's Breath Rating: 5 out of 5 stars5/5Summary of Clarissa Pinkola Estés's Women Who Run With the Wolves Rating: 5 out of 5 stars5/5Summary of Erin Meyer's The Culture Map Rating: 5 out of 5 stars5/5Summary of Dr. Julie Smith's Why Has Nobody Told Me This Before? Rating: 4 out of 5 stars4/5Summary of Gabor Mate's When the Body Says No Rating: 0 out of 5 stars0 ratingsSummary of Lindsay C. Gibson's Self-Care for Adult Children of Emotionally Immature Parents Rating: 5 out of 5 stars5/5Summary of Haemin Sunim's The Things You Can See Only When You Slow Down Rating: 5 out of 5 stars5/5Summary of Mark Douglas' The Disciplined Trader™ Rating: 5 out of 5 stars5/5Summary of Brendan Kane's One Million Followers Rating: 0 out of 5 stars0 ratingsSummary of Bronnie Ware's Top Five Regrets of the Dying Rating: 4 out of 5 stars4/5Summary of Gordon Neufeld & Gabor Maté's Hold On to Your Kids Rating: 5 out of 5 stars5/5Summary of Devon Price's Unmasking Autism Rating: 5 out of 5 stars5/5Summary of Uma Naidoo's This Is Your Brain on Food Rating: 5 out of 5 stars5/5Summary of Anna Coulling's A Complete Guide To Volume Price Analysis Rating: 5 out of 5 stars5/5Summary of Gino Wickman's Traction Rating: 4 out of 5 stars4/5Summary of Rebecca Fett's It Starts With The Egg Rating: 0 out of 5 stars0 ratingsSummary of Thomas Erikson's Surrounded by Idiots Rating: 1 out of 5 stars1/5
Related to Summary of David E. Sanger's The Perfect Weapon
Related ebooks
Summary of Ben Buchanan's The Hacker and the State Rating: 0 out of 5 stars0 ratingsA United Nations Renaissance: What the UN is, and what it could be Rating: 0 out of 5 stars0 ratingsWar Amongst the People: Critical Assessments Rating: 0 out of 5 stars0 ratingsA Troubled Peace Rating: 0 out of 5 stars0 ratingsSmall States in World Markets: Industrial Policy in Europe Rating: 4 out of 5 stars4/5Partitioning for Peace: An Exit Strategy for Iraq Rating: 0 out of 5 stars0 ratingsDivide and Perish: The Geopolitics of the Middle East, Second Edition Rating: 0 out of 5 stars0 ratingsCoalition Challenges in Afghanistan: The Politics of Alliance Rating: 0 out of 5 stars0 ratingsThe Long War: CENTCOM, Grand Strategy, and Global Security Rating: 0 out of 5 stars0 ratingsStopping the Bomb: The Sources and Effectiveness of US Nonproliferation Policy Rating: 0 out of 5 stars0 ratingsDiversionary War: Domestic Unrest and International Conflict Rating: 0 out of 5 stars0 ratingsAmerica's National Security Architecture: Rebuilding the Foundation Rating: 5 out of 5 stars5/5Negotiating with Evil: When to Talk to Terrorists Rating: 0 out of 5 stars0 ratingsInsider Threats Rating: 5 out of 5 stars5/5The Privatisation of Security in the Kurdistan Region of Iraq Rating: 0 out of 5 stars0 ratingsTaiwan Straits Standoff: 70 Years of PRC–Taiwan Cross-Strait Tensions Rating: 0 out of 5 stars0 ratingsCoercion, Survival, and War: Why Weak States Resist the United States Rating: 0 out of 5 stars0 ratingsThe Myth of the Nuclear Revolution: Power Politics in the Atomic Age Rating: 0 out of 5 stars0 ratingsThe Statebuilder's Dilemma: On the Limits of Foreign Intervention Rating: 0 out of 5 stars0 ratingsThe Purpose of Intervention: Changing Beliefs about the Use of Force Rating: 4 out of 5 stars4/5The China-India Nuclear Crossroads Rating: 0 out of 5 stars0 ratingsThe Futility of War Rating: 0 out of 5 stars0 ratingsCounterinsurgency In Eastern Afghanistan 2004-2008: A Civilian Perspective Rating: 0 out of 5 stars0 ratingsSocial Logic Of Politics: Personal Networs As Contexts Rating: 0 out of 5 stars0 ratingsEngines of Diplomacy: Indian Trading Factories and the Negotiation of American Empire Rating: 4 out of 5 stars4/5Critical security in the Asia-Pacific Rating: 0 out of 5 stars0 ratingsRegime Change: National Security in the Age of Terrorism Rating: 0 out of 5 stars0 ratingsFollowing the Leader: International Order, Alliance Strategies, and Emulation Rating: 0 out of 5 stars0 ratingsRape during Civil War Rating: 0 out of 5 stars0 ratingsSummary of Sean McFate's The New Rules of War Rating: 0 out of 5 stars0 ratings
Social Science For You
My Secret Garden: Women's Sexual Fantasies Rating: 4 out of 5 stars4/5The Song of the Cell: An Exploration of Medicine and the New Human Rating: 4 out of 5 stars4/5A People's History of the United States Rating: 4 out of 5 stars4/5Come As You Are: Revised and Updated: The Surprising New Science That Will Transform Your Sex Life Rating: 4 out of 5 stars4/5Fervent: A Woman's Battle Plan to Serious, Specific, and Strategic Prayer Rating: 5 out of 5 stars5/5Questions for Couples: 469 Thought-Provoking Conversation Starters for Connecting, Building Trust, and Rekindling Intimacy Rating: 0 out of 5 stars0 ratingsThe Art of Witty Banter: Be Clever, Quick, & Magnetic Rating: 4 out of 5 stars4/5Just Mercy: a story of justice and redemption Rating: 5 out of 5 stars5/5Prisoners of Geography: Ten Maps That Explain Everything About the World Rating: 4 out of 5 stars4/5All About Love: New Visions Rating: 4 out of 5 stars4/5The Like Switch: An Ex-FBI Agent's Guide to Influencing, Attracting, and Winning People Over Rating: 4 out of 5 stars4/5The Body Is Not an Apology, Second Edition: The Power of Radical Self-Love Rating: 4 out of 5 stars4/5The Human Condition Rating: 4 out of 5 stars4/5The Sun Does Shine: How I Found Life and Freedom on Death Row (Oprah's Book Club Selection) Rating: 4 out of 5 stars4/5Women Don't Owe You Pretty Rating: 4 out of 5 stars4/5The Denial of Death Rating: 4 out of 5 stars4/5Verbal Judo, Second Edition: The Gentle Art of Persuasion Rating: 4 out of 5 stars4/5Bad Feminist: Essays Rating: 4 out of 5 stars4/5Homicide: A Year on the Killing Streets Rating: 4 out of 5 stars4/5The Fourth Turning Is Here: What the Seasons of History Tell Us about How and When This Crisis Will End Rating: 4 out of 5 stars4/5Waking Up: A Guide to Spirituality Without Religion Rating: 4 out of 5 stars4/5You're Not Listening: What You're Missing and Why It Matters Rating: 4 out of 5 stars4/5
Reviews for Summary of David E. Sanger's The Perfect Weapon
0 ratings0 reviews
Book preview
Summary of David E. Sanger's The Perfect Weapon - IRB Media
Insights on David E. Sanger's The Perfect Weapon
Contents
Insights from Chapter 1
Insights from Chapter 2
Insights from Chapter 3
Insights from Chapter 4
Insights from Chapter 5
Insights from Chapter 6
Insights from Chapter 7
Insights from Chapter 8
Insights from Chapter 9
Insights from Chapter 10
Insights from Chapter 11
Insights from Chapter 12
Insights from Chapter 1
#1
In 2012, I met with Michael Morell, the deputy director of the CIA, to discuss a sensitive story the Times was preparing to publish. I knew that the meeting would be difficult, as the US government was not yet ready to discuss the consequences of its decision to use cyberweapons against another state in peacetime.
#2
I had come to hear about which details of the Olympic Games story concerned Morell and his colleagues, and they were preparing to ask the Times to withhold them, lest we tip off other targets of ongoing operations.
#3
The Obama administration was extremely secretive about its use of cyberweapons, and it was unclear how the public should feel about them. But there was no backtracking. When Michael Hayden, who had been central to the early days of America’s experimentation with cyberweapons, said that the Stuxnet code had the whiff of August 1945 about it, he was making clear that a new era had dawned.
#4
Hayden’s insight into the game-changing nature of cyber conflict began in 1998, when he was assigned to San Antonio, Texas, as the commander of the Air Intelligence Agency. He remembered watching in wonder as members of the staff disabled remote workstations and used electronic-warfare techniques to fool a radarscope.
#5
The attack forced the United States to confront the implications of the digital age. The NSA, responsible for encrypting and protecting sensitive information, shifted its focus to computer data stored around the world that was vulnerable to the agency’s fast-growing cadres of hackers.
#6
Strategic Command is in charge of the nation’s nuclear arsenal. It was the first line of defense against a nuclear conflict with the Soviets, and it was responsible for maintaining and moving nuclear weapons.
#7
Cartwright was concerned about the strategic vacuum. America’s reliance on nuclear deterrence was actually restricting a president’s ability to deal with the kind of adversaries the United States was facing every day. He began thinking about how cyberweapons could expand a president’s choices.