Summary of Dark Territory

Looking for the book?
We have the summary! Get the key insights in just 10 minutes.

Dark Territory book summary
Start getting smarter:
or see our plans

Rating

8 Overall

9 Importance

8 Innovation

8 Style


Recommendation

Much of the work of national security agencies and private or hired-gun hackers occurs in secret and some of it involves cyberwarfare, a realm of constantly changing esoteric technology. When events come to light, they provoke considerable denial and conflicting narratives. This makes Pulitzer Prize-winning reporter Fred Kaplan’s lucid history of US involvement in cyberwarfare all the more impressive. In this useful look at a complicated subject, he explains cyberwar’s main participants and events, and he clarifies the politics and technologies involved. getAbstract recommends his welcome precision and strong moral sense to anyone interested in global politics, civil liberties in cyberspace, history, or the intersection of technology and society.

In this summary, you will learn

  • What forces shape the history of cyberwar,
  • Who generates cyberwar and makes related policy and
  • What the nature of cyberwar is today.
 

About the Author

Slate’s national security columnist Fred Kaplan won a Pulitzer Prize as a reporter for The Boston Globe, and was a finalist for his book The Insurgents. His other books include The Wizards of Armageddon and Daydream Believers.

 

Summary

Cybersecurity Issues
Armies have intercepted one another’s communications since the time of the ancient Romans. Since the 19th century, militaries have used cryptographers to encode messages and break the enemy’s codes. Rather than merely retrieving signals, cyberfighters change or corrupt...

More on this topic

Customers who read this summary also read

The Hacked World Order
The Hacked World Order
9
Here’s How We Take Back the Internet
Here’s How We Take Back the Internet
9
How (and Why) Russia Hacked the US Election
How (and Why) Russia Hacked the US Election
8
How Free Is Our Freedom of the Press?
How Free Is Our Freedom of the Press?
8
The Seventh Sense
The Seventh Sense
9
Cyber Attacks
Cyber Attacks
8

Related Channels

Comment on this summary