skip to content
Hacking the bomb : cyber threats and nuclear weapons Preview this item
ClosePreview this item
Checking...

Hacking the bomb : cyber threats and nuclear weapons

Author: Andrew Futter
Publisher: Washington, DC : Georgetown University Press, [2018]
Edition/Format:   Print book : EnglishView all editions and formats
Summary:
Are nuclear arsenals safe from cyber attack? We may be standing at the edge of a major technological challenge to global nuclear order. The increasing sophistication of hacking and cyber weapons, information warfare capabilities, and other dynamics of the cyber age are challenging the management, safeguards, and warning systems for nuclear weapons. Every nuclear power is currently modernizing its nuclear command,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Document Type: Book
All Authors / Contributors: Andrew Futter
ISBN: 9781626165649 1626165645 9781626165656 1626165653
OCLC Number: 1001431375
Description: xiii, 197 pages ; 24 cm
Contents: Introduction : WarGames redux? --
The nature of the challenge --
What exactly do we mean by the cyber challenge? --
How and why might nuclear systems be vulnerable? --
What might hackers do to nuclear systems? --
Stealing nuclear secrets --
Could cyber-attacks lead to nuclear use or stop systems from working? --
The cyber-nuclear nexus at the strategic level --
Cuberdetterence, nuclear weapons, and managing strategic threats --
A A cyber-nuclear security dilemma, nuclear stability, and crisis management --
Challenges for our cyber-nuclear future --
Nuclear weapons modernisation, advanced conventional weapons, and the future global nuclear environment --
Conclusion : managing our cyber-nuclear future.
Responsibility: Andrew Futter ; foreword by Lord Des Browne.

Abstract:

This ground-breaking study cuts through the hype surrounding the cyber phenomenon and provides a framework through which to understand the implications of the emerging cyber-nuclear nexus. Futter  Read more...

Reviews

Editorial reviews

Publisher Synopsis

A compelling analysis of how information systems associated with nuclear weapons might be vulnerable, what adversaries might do with such vulnerabilities and what all this might mean for strategic Read more...

 
User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1001431375> # Hacking the bomb : cyber threats and nuclear weapons
    a schema:CreativeWork, schema:Book ;
    library:oclcnum "1001431375" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/dcu> ;
    schema:about <http://dewey.info/class/355.825119/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/4466576462#Topic/information_warfare> ; # Information warfare
    schema:about <http://experiment.worldcat.org/entity/work/data/4466576462#Topic/command_and_control_systems> ; # Command and control systems
    schema:about <http://experiment.worldcat.org/entity/work/data/4466576462#Topic/89_87_weapons_arms_and_armor> ; # 89.87 weapons, arms and armor
    schema:about <http://experiment.worldcat.org/entity/work/data/4466576462#Topic/nuclear_weapons_security_measures> ; # Nuclear weapons--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/4466576462#Topic/hacking> ; # Hacking
    schema:about <http://experiment.worldcat.org/entity/work/data/4466576462#Topic/nuclear_weapons> ; # Nuclear weapons
    schema:about <http://experiment.worldcat.org/entity/work/data/4466576462#Topic/cyberspace_operations_military_science> ; # Cyberspace operations (Military science)
    schema:author <http://experiment.worldcat.org/entity/work/data/4466576462#Person/futter_andrew_1983> ; # Andrew Futter
    schema:bookFormat bgn:PrintBook ;
    schema:datePublished "2018" ;
    schema:description "Are nuclear arsenals safe from cyber attack? We may be standing at the edge of a major technological challenge to global nuclear order. The increasing sophistication of hacking and cyber weapons, information warfare capabilities, and other dynamics of the cyber age are challenging the management, safeguards, and warning systems for nuclear weapons. Every nuclear power is currently modernizing its nuclear command, control, and communications (NC3) capabilities, but there is a danger that in upgrading computer systems and making NC3 more networked, states may inadvertently also make their nuclear arsenals more vulnerable to breaches, interference, or even unintended use. In addition to implications for NC3, this new age also affects nuclear strategy, escalation dynamics in crisis management, and the ability to safeguard nuclear secrets. Andrew Futter cuts through the hype surrounding these challenges and provides a framework through which to understand and proactively address the implications of this emerging cyber-nuclear nexus."@en ;
    schema:description "Introduction : WarGames redux? -- The nature of the challenge -- What exactly do we mean by the cyber challenge? -- How and why might nuclear systems be vulnerable? -- What might hackers do to nuclear systems? -- Stealing nuclear secrets -- Could cyber-attacks lead to nuclear use or stop systems from working? -- The cyber-nuclear nexus at the strategic level -- Cuberdetterence, nuclear weapons, and managing strategic threats -- A A cyber-nuclear security dilemma, nuclear stability, and crisis management -- Challenges for our cyber-nuclear future -- Nuclear weapons modernisation, advanced conventional weapons, and the future global nuclear environment -- Conclusion : managing our cyber-nuclear future."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/4466576462> ;
    schema:inLanguage "en" ;
    schema:name "Hacking the bomb : cyber threats and nuclear weapons"@en ;
    schema:productID "1001431375" ;
    schema:workExample <http://worldcat.org/isbn/9781626165656> ;
    schema:workExample <http://worldcat.org/isbn/9781626165649> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1001431375> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/4466576462#Person/futter_andrew_1983> # Andrew Futter
    a schema:Person ;
    schema:birthDate "1983" ;
    schema:familyName "Futter" ;
    schema:givenName "Andrew" ;
    schema:name "Andrew Futter" ;
    .

<http://experiment.worldcat.org/entity/work/data/4466576462#Topic/89_87_weapons_arms_and_armor> # 89.87 weapons, arms and armor
    a schema:Intangible ;
    schema:name "89.87 weapons, arms and armor"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4466576462#Topic/command_and_control_systems> # Command and control systems
    a schema:Intangible ;
    schema:name "Command and control systems"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4466576462#Topic/cyberspace_operations_military_science> # Cyberspace operations (Military science)
    a schema:Intangible ;
    schema:name "Cyberspace operations (Military science)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4466576462#Topic/information_warfare> # Information warfare
    a schema:Intangible ;
    schema:name "Information warfare"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/4466576462#Topic/nuclear_weapons_security_measures> # Nuclear weapons--Security measures
    a schema:Intangible ;
    schema:name "Nuclear weapons--Security measures"@en ;
    .

<http://worldcat.org/isbn/9781626165649>
    a schema:ProductModel ;
    schema:isbn "1626165645" ;
    schema:isbn "9781626165649" ;
    .

<http://worldcat.org/isbn/9781626165656>
    a schema:ProductModel ;
    schema:isbn "1626165653" ;
    schema:isbn "9781626165656" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.