Related collections and offers
|Publisher:||Georgetown University Press|
|Product dimensions:||6.00(w) x 9.00(h) x (d)|
|Age Range:||18 Years|
About the Author
Table of ContentsForeword by The Rt. Hon. Lord Browne of Ladyton Acknowledgments Introduction: WarGames Redux? Part 1: The Nature of the Challenge 1. What Exactly Do We Mean by the Cyber Challenge? 2. How and Why Might Nuclear Systems Be Vulnerable? Part 2: What Might Hackers Do to Nuclear Systems? 3. Stealing Nuclear Secrets 4. Could Cyberattcks Lead to Nuclear Use or Stop Systems from Working? Part 3: The Cyber-Nuclear Nexus at the Strategic Level 5. Cyberdeterrence, Nuclear Weapons, and Managing Strategic Threats 6. A Cyber-Nuclear Security Dilemma, Nuclear Stability, and Crisis ManagementPart 4: Challenges for Our Cyber-Nuclear Future7. Nuclear Weapons Modernization, Advanced Conventional Weapons, and the Future Global Nuclear Environment Conclusion:Managing Our Cyber-Nuclear Future Bibliography Index About the Author
What People are Saying About This
"If you are bothered by the fact that our top security officials cannot determine with high confidence whether computer malware or other hacking could cause Russian, Chinese, or U.S. nuclear missiles to be illicitly fired, you should read this book. If you are bothered by the fact that cyber operations could confuse leaders into launching nuclear missiles during a crisis, you should read this book. If you are not bothered because you are not aware of such dangers, you should read this book. Professor Futter asks all the right questions about the myriad dangers that information warfare poses to the command and control of nuclear forces, and illuminates the answers to the extent that current knowledge allows. His important and provocative book also connects the cyber issues to the major risks of nuclear instability and accidents, providing rich context for his analysis. A cross between historical investigation, policy analysis, and theory, this is a must-read volume for anyone who cares about this perilous new threat to mankind.
Nuclear strategy is hard – but cyber operations makes it harder. In this thorough and insightful work, Andrew Futter skillfully weaves the many threads binding cyberspace and the nuclear establishment to urge caution for those who would ignore or promote cyberwar on nuclear capabilities. Strategists of all flavors, take note.
In his deeply researched and artfully written Hacking the Bomb, Andrew Futter has added a key nuance: the machines upon which the complex systems that command and control nuclear weapons depend may themselves become prisoners of skillful hackers.