The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age by David E. Sanger
“The Perfect Weapon” is an interesting look at the political implications of cyberwarfare. National security correspondent for the New York Times, David E. Sanger takes the public on a historical ride into the world of cyberweapons and how it has transformed geopolitics. This enlightening 354-page book includes the following twelve chapters: 1. Original Sins, 2. Pandora’s Inbox, 3. The Hundred-Dollar Takedown, 4. Man in the Middle, 5. The China Rules, 6. The Kims Strikes Back, 7. Putin’s Petri Dish, 8. The Fumble, 9. Warning from the Cotswolds, 10. The Slow Awakening, 11. Three Crises in the Valley, and 12. Left of Launch.
Positives:
1. A clearly written and researched book.
2. An interesting topic, the history and implications of cyberwarfare.
3. Sanger has great command of the topic and is very fair and strident with his criticism.
4. An excellent Preface that sets the tone for the book. “Cyberweapons are so cheap to develop and so easy to hide that they have proven irresistible. And American officials are discovering that in a world in which almost everything is connected—phones, cars, electrical grids, and satellites—everything can be disrupted, if not destroyed.”
5. Provides the key difficulty in dealing with cyberwarfare. “After a decade of hearings in Congress, there is still little agreement on whether and when cyberstrikes constitute an act of war, an act of terrorism, mere espionage, or cyber-enabled vandalism.” “But figuring out a proportionate yet effective response has now stymied three American presidents. The problem is made harder by the fact that America’s offensive cyber prowess has so outpaced our defense that officials hesitate to strike back.”
6. The book is full of detailed examples of cyber intrusions committed by our biggest rivals. “Investigators raced to figure out how the Russians had gotten inside. The answer was pretty shocking: The Russians had left USB drives littered around the parking and public areas of a US base in the Middle East. Someone picked one up, and when they put the drive in a laptop connected to SIPRNet, the Russians were inside. By the time Plunkett and her team made their discovery, the bug had spread to all of US Central Command and beyond and begun scooping up data, copying it, and sending it back to the Russians.”
7. Describes interesting military cyber operations. “Cyber Command’s piece of the puzzle was to contribute to an operation named Nitro Zeus. It was a plan—using cyber and other methods—to shut down the entire country, preferably without firing a shot. If Olympic Games was the cyber equivalent of a targeted drone strike on Iran, Nitro Zeus was a full-scale attack.”
8. Cyber espionage by China. “China does more in terms of cyber espionage than all other countries put together,” the expert James Lewis noted to me in the midst of the investigation into Shotgiant. “The question is no longer which industries China is hacking into. It’s which industries they aren’t hacking into.””
9. Discusses the Snowden affair. “The Snowden affair kicked off a remarkable era in which American firms, for the first time in post–World War II history, broadly refused to cooperate with the American government.”
10. A fascinating look at balancing security and privacy. “But Cook had a bigger and better argument, one that the government could not so easily parry: if Apple created a back door into its code, that vulnerability would become the target of every hacker on Earth. The FBI was naïve to think that if the tech companies created a lock and gave the FBI a key, no one else would figure out how to pick it.”
11. Excellent chapter on North Korea. “The North Korean military began training computer “warriors” in earnest in 1996, he recalled, and two years later opened Bureau 121, now the primary cyberattack unit. Members were dispatched for two years of training in China and Russia. Jang Sae-yul, a former North Korean army programmer who defected in 2007, said these prototypical hackers were envied, in part because of their freedom to travel.” “In short, cyberweapons were tailor-made for North Korea’s situation in the world: so isolated it had little to lose, so short of fuel it had no other way to sustain a conflict with greater powers, and so backward that its infrastructure was largely invulnerable to crippling counterattacks.” “Today the North may be the first state to use cybercrime to finance its state operations.”
12. Obama’s view on cybersecurity. “In short, until the Sony attack Obama believed corporate America should take responsibility for defending its own networks, just as they take responsibility for locking their office doors at night. That approach made sense most of the time: Washington could not go to DEFCON 4 every time someone—even a state—went after part of the private sector.”
13. What would a book about cyber intrusions be without Putin. “Putin’s goals in Ukraine were as much psychological as physical. He wanted to declare to Ukrainians that their country exists only because Russia allows it to exist. Putin’s message to the Ukrainians was simple: We own you.” “What happened in Ukraine confirmed the corollary to the Gerasimov doctrine: As long as cyber-induced paralysis was hard to see, and left little blood, it was difficult for any country to muster a robust response.”
14. US elections meddling. “In late 2014, the agency dug into its social media campaign to commence its disruption of the US elections. The group deployed hundreds of fake accounts on Facebook and thousands on Twitter to target populations already divided by issues like immigration, gun control, and minority rights.”
15. The impact of social media. ““I didn’t realize at the time that two-thirds of American adults get their news through social media,” said Haines, who was among the most thoughtful members of Obama’s team about the impact of social movements on democratic processes.”
16. A look at the Shadow Brokers. “Inside the NSA, this breach was regarded as a far greater debacle than the Snowden affair. For all the publicity and media attention around Snowden, a dark if compelling character who could still command headlines from his exile in Russia, the Shadow Brokers were inflicting far more damage.”
17. The use of cyberwarfare to disrupt our enemies. “The goal of the new campaign, I was told in a series of briefings, was to disrupt the Islamic State’s ability to spread its message, attract new adherents, circulate orders from commanders, and carry out day-to-day functions, including paying its fighters.” ““Operation Glowing Symphony,” as it was code-named, would be the largest cyber effort against ISIS and one of the last big cyber operations that Obama approved in the Situation Room.”
18. An expose of Facebook. “From the start, Facebook made its money not by selling connectivity, but by acting as the world’s seemingly friendly surveillance machine, then selling what it learned about users, individually and collectively.” “In September 2017, ten months after the election, the company finally began to concede the obvious. It said those who had manipulated Facebook “likely operated out of Russia,” and it turned over 3,000 of these ads to Congress.”
19. Interesting tidbits throughout the book. “A government that still gave lip service to communism had figured out venture capitalism—and concluded it was the shortest path to get the technologies the country needed.”
20. The legal difficulties in dealing with cyber issues. “There is no issue on which government lawyers have spent more time, to less productive effect, than on the question of how the laws of war apply to cyber.”
Negatives:
1. Doesn’t do a good job of distinguishing the different categories within cyberwarfare.
2. Lack of supplementary visual material. No charts, no photos, few diagrams to compliment the otherwise excellent narrative.
3. Limited links to notes.
4. If you are an avid news junkie and follow cyberwarfare a lot of what’s in the book will seem like well old news.
In summary, I really enjoyed this book. Sanger does a wonderful job of describing the difficulties of dealing with cyberwarfare and its implications. He clearly is well connected and takes advantage of such access to provide the public with some keen insights. The book is full of detailed examples of cyber intrusion by well-known actors like Russia, China, North Korea and Iran. A few shortcomings but overall a worthy read on an important hot topic, I recommend it!
Further suggestions: “Dark Territory: The Secret History of Cyber War” by Fred Kaplan, “Like War: The Weaponization of Social Media” and “Cybersecurity and Cyberwar” by P.W. Singer, “Dawn of the Code War” by John P. Carlin, “Cyber War” by Richard A. Clarke, “Facts and Fears: Hard Truths from a Life in Intelligence” by James R. Clapper and Trey Brown, “A Higher Loyalty” by James Comey, and “The Assault on Intelligence” by Michael V. Hayden.