skip to content
Covid-19 virus
COVID-19 Resources

Reliable information about the coronavirus (COVID-19) is available from the World Health Organization (current situation, international travel). Numerous and frequently-updated resource results are available from this WorldCat.org search. OCLC’s WebJunction has pulled together information and resources to assist library staff as they consider how to handle coronavirus issues in their communities.

Image provided by: CDC/ Alissa Eckert, MS; Dan Higgins, MAM
Dark territory : the secret history of cyber war Preview this item
ClosePreview this item
Checking...

Dark territory : the secret history of cyber war

Author: Fred M Kaplan
Publisher: New York : Simon & Schuster Paperbacks, 2017. ©2016
Edition/Format:   Print book : English : First Simon & Schuster trade paperback editionView all editions and formats
Summary:
"In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer security. From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: History
Document Type: Book
All Authors / Contributors: Fred M Kaplan
ISBN: 9781476763262 1476763267
OCLC Number: 987329985
Description: ix, 343 pages ; 21 cm
Contents: "Could something like this really happen?" --
"It's all about the information" --
A cyber Pearl Harbor --
Eligible receiver --
Solar sunrise, moonlight maze --
The coordinator meets Mudge --
Deny, exploit, corrupt, destroy --
Tailored access --
Cyber wars --
Buckshot Yankee --
"The whole haystack" --
"Somebody has crossed the Rubicon" --
Shady RATs --
"The five guys report" --
"We're wandering in dark territory."
Responsibility: Fred Kaplan.

Abstract:

"In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer security. From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role, Dark Territory chronicles a little-known past that shines an unsettling light on our future. Fred Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the "information warfare" squads of the military services, and the national security debates in the White House to reveal the details of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning--and (more often than people know) fighting--these wars for decades."--Publisher's description.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


\n\n

Primary Entity<\/h3>\n
<http:\/\/www.worldcat.org\/oclc\/987329985<\/a>> # Dark territory : the secret history of cyber war<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Book<\/a>, schema:CreativeWork<\/a> ;\u00A0\u00A0\u00A0\nlibrary:oclcnum<\/a> \"987329985<\/span>\" ;\u00A0\u00A0\u00A0\nlibrary:placeOfPublication<\/a> <http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/history_military_general<\/a>> ; # HISTORY--Military--General<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/cyberterrorism_prevention<\/a>> ; # Cyberterrorism--Prevention<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/computer_crimes_prevention_united_states<\/a>> ; # Computer crimes--Prevention.--United States<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/information_warfare<\/a>> ; # Information warfare<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/dewey.info\/class\/363.325\/e23\/<\/a>> ;\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Organization\/usa_national_security_agency<\/a>> ; # USA National Security Agency<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Place\/united_states<\/a>> ; # United States.<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/technology_&_engineering_military_science<\/a>> ; # TECHNOLOGY & ENGINEERING--Military Science<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/terrorism_prevention_united_states<\/a>> ; # Terrorism--Prevention.--United States<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/cyberterrorism_united_states_prevention_history<\/a>> ; # Cyberterrorism--United States--Prevention--History<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/computers_security_viruses<\/a>> ; # COMPUTERS--Security--Viruses<\/span>\n\u00A0\u00A0\u00A0\nschema:about<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Organization\/umschulungswerkstatten_fur_siedler_und_auswanderer<\/a>> ; # Umschulungswerkst\u00E4tten f\u00FCr Siedler und Auswanderer<\/span>\n\u00A0\u00A0\u00A0\nschema:author<\/a> <http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Person\/kaplan_fred_m<\/a>> ; # Fred M. Kaplan<\/span>\n\u00A0\u00A0\u00A0\nschema:bookEdition<\/a> \"First Simon & Schuster trade paperback edition.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:bookFormat<\/a> bgn:PrintBook<\/a> ;\u00A0\u00A0\u00A0\nschema:datePublished<\/a> \"2017<\/span>\" ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"\"In June 1983, President Reagan watched the movie War Games, in which a teenager unwittingly hacks the Pentagon, and asked his top general if the scenario was plausible. The general said it was. This set in motion the first presidential directive on computer security. From the 1991 Gulf War to conflicts in Haiti, Serbia, Syria, the former Soviet republics, Iraq, and Iran, where cyber warfare played a significant role, Dark Territory chronicles a little-known past that shines an unsettling light on our future. Fred Kaplan probes the inner corridors of the National Security Agency, the beyond-top-secret cyber units in the Pentagon, the \"information warfare\" squads of the military services, and the national security debates in the White House to reveal the details of the officers, policymakers, scientists, and spies who devised this new form of warfare and who have been planning--and (more often than people know) fighting--these wars for decades.\"--Publisher\'s description.<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:description<\/a> \"\"Could something like this really happen?\" -- \"It\'s all about the information\" -- A cyber Pearl Harbor -- Eligible receiver -- Solar sunrise, moonlight maze -- The coordinator meets Mudge -- Deny, exploit, corrupt, destroy -- Tailored access -- Cyber wars -- Buckshot Yankee -- \"The whole haystack\" -- \"Somebody has crossed the Rubicon\" -- Shady RATs -- \"The five guys report\" -- \"We\'re wandering in dark territory.\"<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:exampleOfWork<\/a> <http:\/\/worldcat.org\/entity\/work\/id\/2564667930<\/a>> ;\u00A0\u00A0\u00A0\nschema:genre<\/a> \"History<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:inLanguage<\/a> \"en<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Dark territory : the secret history of cyber war<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\nschema:productID<\/a> \"987329985<\/span>\" ;\u00A0\u00A0\u00A0\nschema:workExample<\/a> <http:\/\/worldcat.org\/isbn\/9781476763262<\/a>> ;\u00A0\u00A0\u00A0\nwdrs:describedby<\/a> <http:\/\/www.worldcat.org\/title\/-\/oclc\/987329985<\/a>> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n\n

Related Entities<\/h3>\n
<http:\/\/dewey.info\/class\/363.325\/e23\/<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Organization\/umschulungswerkstatten_fur_siedler_und_auswanderer<\/a>> # Umschulungswerkst\u00E4tten f\u00FCr Siedler und Auswanderer<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Organization<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Umschulungswerkst\u00E4tten f\u00FCr Siedler und Auswanderer<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Organization\/usa_national_security_agency<\/a>> # USA National Security Agency<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Organization<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"USA National Security Agency<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Person\/kaplan_fred_m<\/a>> # Fred M. Kaplan<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Person<\/a> ;\u00A0\u00A0\u00A0\nschema:familyName<\/a> \"Kaplan<\/span>\" ;\u00A0\u00A0\u00A0\nschema:givenName<\/a> \"Fred M.<\/span>\" ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Fred M. Kaplan<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Place\/united_states<\/a>> # United States.<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"United States.<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/computer_crimes_prevention_united_states<\/a>> # Computer crimes--Prevention.--United States<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Computer crimes--Prevention.--United States<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/computers_security_viruses<\/a>> # COMPUTERS--Security--Viruses<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"COMPUTERS--Security--Viruses<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/cyberterrorism_prevention<\/a>> # Cyberterrorism--Prevention<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberterrorism--Prevention<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/cyberterrorism_united_states_prevention_history<\/a>> # Cyberterrorism--United States--Prevention--History<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Cyberterrorism--United States--Prevention--History<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/history_military_general<\/a>> # HISTORY--Military--General<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"HISTORY--Military--General<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/information_warfare<\/a>> # Information warfare<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Information warfare<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/technology_&_engineering_military_science<\/a>> # TECHNOLOGY & ENGINEERING--Military Science<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"TECHNOLOGY & ENGINEERING--Military Science<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/experiment.worldcat.org\/entity\/work\/data\/2564667930#Topic\/terrorism_prevention_united_states<\/a>> # Terrorism--Prevention.--United States<\/span>\n\u00A0\u00A0\u00A0\u00A0a \nschema:Intangible<\/a> ;\u00A0\u00A0\u00A0\nschema:name<\/a> \"Terrorism--Prevention.--United States<\/span>\"@en<\/a> ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/id.loc.gov\/vocabulary\/countries\/nyu<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:Place<\/a> ;\u00A0\u00A0\u00A0\ndcterms:identifier<\/a> \"nyu<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n
<http:\/\/worldcat.org\/isbn\/9781476763262<\/a>>\u00A0\u00A0\u00A0\u00A0a \nschema:ProductModel<\/a> ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"1476763267<\/span>\" ;\u00A0\u00A0\u00A0\nschema:isbn<\/a> \"9781476763262<\/span>\" ;\u00A0\u00A0\u00A0\u00A0.\n\n\n<\/div>\n