Summary of The Hacked World Order

Looking for the book?
We have the summary! Get the key insights in just 10 minutes.

The Hacked World Order book summary
Start getting smarter:
or see our plans

Rating

9 Overall

10 Importance

8 Innovation

9 Style

Recommendation

World powers increasingly use computer espionage to spy on their rivals, spread propaganda and even sabotage nuclear weapons programs. Technology expert Adam Segal’s engaging study persuasively presents cyberspace as the new front line in geopolitical combat. International superpowers, outlier nations and cold-blooded terrorists alike have leapt into cyberwar, portending an unpredictable future for Internet security and diplomatic relations. getAbstract recommends this clearheaded, informative overview to technologists, policy makers, investors and NGOs seeking insight into a new era of international relations and threats.

In this summary, you will learn

  • How the new era of cyberwarfare differs from the past,
  • How this trend affects diplomatic relations, and
  • How nations and companies respond.
 

About the Author

Adam Segal is the Maurice R. Greenberg Senior Fellow for China Studies and director of the Program on Digital and Cyberspace Policy at the Council on Foreign Relations.

 

Summary

Bomb-Free Attack
The new era of cyberwar became public knowledge in 2012, when US intelligence officials leaked details of the Stuxnet attack to The New York Times. Stuxnet, which took place a few years before the leak, was a brilliant piece of malicious software that American...

Get the key points from this book in 10 minutes.

For you

Find the right subscription plan for you.

For your company

We help you build a culture of continuous learning.

 or log in

Comment on this summary

  • Avatar
  • Avatar
    Steve Townsley 2 days ago
    Has a number of factual errors and suffers from lazy analysis
  • Avatar
    John Pfeiffer 1 year ago
    Apropos in light of the FBI vs Apple case and of course the inevitable InternetOfThings (including self driving cars). Not sure what the author suggests next though? (Hints at post hack public disclosure requirements? A Geneva convention for hacking?)
  • Avatar
    Bhavya Bhatnagar 1 year ago
    very interesting
  • Avatar
    Angela Militello 1 year ago
    Great

More on this topic

Customers who read this summary also read

More by category