Summary Of @ War: The Rise Of The Internet-Military Complex By Shane Harris

Great Essays
Shane Harris in his book @War: The Rise of the Internet-Military Complex (2015) explains that the government is partnering with large technology companies in order to carry out espionage and digital attacks that have real world consequences. Harris supports his claims by describing the operations and programs the US engaged in alongside private technology companies based on public knowledge and on interviews conducted with top US officials. The author’s purpose is to inform the audience about the potential dangers of cyberwar and how the government is deeply involved in cyberspace, both defensively and offensively, so that the reader understands the potent risks we face in a digital world and can decide whether or not the government’s involvement …show more content…
He claims the book is based on over one-thousand interviews conducted with government employees and other influential people in the field. Harris discloses how crucial it is for people who work for the government to refrain from sharing classified information, but explains that the line between classified and public knowledge becomes blurred. For this reason, Harris agreed to not disclose the identities of many of his sources. However, he promises that when he needs to cite anonymous sources, he does his best to explain why the sources are credible and …show more content…
The aforementioned Stuxnet worm that delayed Iran’s nuclear capabilities by two years is used to support this claim. The author also supports this claim by claiming a cyber attack could potentially cripple an economy. Simply deleting data from banking systems could result in economic crisis. Harris cites an instance where the military planned to attack Iraq’s banking system prior to the 2003 invasion, however the military called off this plan because they feared the attack may accidentally spread to France’s banking system. This shows the nature of digital warfare is similar to that of physical warfare; an attack can have accidental effects on unintended targets. This is reflected in the Presidential Policy Directive 20 passed by the Obama administration in 2012. This document lays a framework and designates responsibilities in the case of digital warfare. Perhaps most importantly, this document states that when the US carries out a digital attack, it must result in minimal collateral damage and it must not spread to unintended targets. This document makes clear that the presidential administration also recognises the extraordinary power and risks in cyber

Related Documents

  • Improved Essays

    “The first computer viruses hit computers in the early 1980s, and essentially we’ve been in a cyber-arms race ever since. We design new defenses, and then hackers and criminals design new ways to penetrate them….We’ve got to be just as fast and flexible and nimble in constantly evolving our defenses.” -President Barack Obam…

    • 428 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    9/11 Turning Point

    • 298 Words
    • 2 Pages

    September 11, 2001, was a terrible tragedy by any measure, but it was not a historical turning point. It herald a new era of international relations in which terrorists with a global agenda prevailed, or in which such spectacular terrorist attacks became commonplace. On the contrary, 9/11 has not replicated. Despite the attention devoted to the “Global War on Terrorism,” the most important developments of the last ten years have been the introduction and spread of innovative information technologies, globalization, the wars in Iraq and Afghanistan, and the political disruptions in the Middle East.…

    • 298 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    "In this day of age, we have dedicated large portions of our lives to the internet and staying connected. This allows a wide variety of knowledge and entertainment to be brought into every home. However, the vast amount of resources available online can possibly be a bad thing. Countless organizations of crime and terrorism roam the online world with a sense of anonymity and the resources to mass spread their ideologies across the world. This has led to the creation of governmental organizations such as the National Security Agency (NSA) that hold the main goal of trying to prevent terrorist and crime organizations from carrying out evil and violent attacks on the people of the United States and the world.…

    • 523 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In the article “The Internet is a surveillance state”, which appeared on CNN.com on March 16, 2013, Bruce Schneier claims the government can see our every move on the internet. He goes on to state, “Whether we admit it to ourselves or not, whether we like it or not, we’re being tracked at all times.” (55). He uses specific and persuasive examples from his work experience to share his thoughts and beliefs on a subject that not everyone is aware of, but the ones who do are usually chilled by it. This paper will analyze Schneier’s article from his view as an American security technologist, cryptologist, and author of “Liars and authors:…

    • 801 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    The PATRIOT Act included new intelligence methods that are controversially viewed as breaching of civil liberties. The advancing front of civil liberties creates political limitations of intelligence. The increase of electronic communications has brought the private sector directly into the battle between homeland security and civil liberties. Homeland security intelligence is the invisible connections that fight the web of terrorism. Past centralized intelligence methods have been replace with a great number of resources spanning the line from Federal to local street level.…

    • 1584 Words
    • 7 Pages
    Great Essays
  • Improved Essays

    Edward Snowden Fed Up

    • 711 Words
    • 3 Pages

    Since the 9/11 Terrorist Attacks and the creation of the Patriot Act the United States government has been intruding in the personal lives of its’ citizens. The government barges in on large companies like Verizon to obtain personal information from our daily lives. The claim is that this inform ation that the government is collecting is for our safety, but what are they really keeping us safe from if terrorist attacks are still happening, domestic and nondomestic. How does the information of innocent citizens help find or determine future crimes? CitizenFour documents Edward Snowden’s perspective on the NSA spying scandal in which information of the government’s massive covert-surveillance programs was leaked.…

    • 711 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Essay On Homeland Security

    • 1030 Words
    • 5 Pages

    Homeland Security means only one thing, protect your country and the secret service is the first line of protection. “The Department of Homeland Security has a vital mission: to secure the nation from the many threats we face. Our duties are wide-ranging, but our goal is clear - keeping America safe.” The Department of Homeland Security is charged with the primary responsibilities of protecting the United States divided into 22 divisions that respond to terrorist attacks, man-made accidents, and natural disasters. Perhaps the most significant of these divisions is the The United States Secret Service (USSS) who primarily focus on financial crimes and protection.…

    • 1030 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    Because of the sensitive nature of terrorist attacks, all suspicions must be addressed. The USA Patriot can bypass the Fourth Amendment as a law enforcer can voice their suspicions on an individual or corporation based on assumptions (Evans, J., 2002). According to O’Meara, a research director by the name of Dave Kopel, mentioned that The USA Patriot Act even allows individuals to be put in powerless positions despite their nonexistent involvement in terroristic activities. In this position, these…

    • 1380 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    In 2013, Edward Snowden uploaded classified information from the United States government onto the internet. The documents highlighted the extent to which the government was gathering information from the public without having warrants or a reason linking them to terrorism. This act has condemned Snowden as a traitor to the United States. Nonetheless, it brought public attention to the activities of the government that could be considered unconstitutional as well as a breach of privacy and trust. It is imperative that citizens hold the government accountable and many consider Snowden’s actions heroic.…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Past War Theory

    • 130 Words
    • 1 Pages

    I agree with your statement, “The United States needs to develop and employ policies, doctrine, tools, deterrent models, and rules of engagement against actors in cyberspace.” The AF is faced with writing the theory and doctrine for handling cyber-warfare, and defining which acts quantify as acts of war. Past war theory will help our AF make decisions, but cyberspace is not well covered in current warfare theory. The White House stated in 2011that the “United States will respond to hostile acts in cyberspace as we would to any other threat to our country.…

    • 130 Words
    • 1 Pages
    Improved Essays
  • Improved Essays

    In spite of the fact that the Homeland Security’s main priority is to protect the civilians of the U.S, many worry that the funding is not necessarily used in the correct manner. It is understood that some believe that the expenditure is used to frequently obtain information on citizens and many feel this is a breach of privacy rights. Opposing parties believe that homeland security strategies can, and do, break regulations centred on human privacy rights. According to Kevin M. Keenan, eight states financially supported by the U.S. Department of Homeland Security began experimenting the total information Multistate Anti-terrorism Exchange, also known as MATRIX.…

    • 1090 Words
    • 4 Pages
    Improved Essays
  • Superior Essays

    Introduction Cybersecurity should have always been important to anyone using technological devices. Now it is not only important but rather essential to maintain quality performance of technology. The cyber world will never be completely free of cyber attacks, cyber espionage or cyber threats same as how the physical world will never be completely free of crime. However we must seek to limit the amount of cyber security violations as well as the severity of any violations. This can only be done by full compliance and partnership between the government and the people.…

    • 2171 Words
    • 9 Pages
    Superior Essays
  • Superior Essays

    Homeland Security Threats

    • 1252 Words
    • 6 Pages

    The Department of Homeland Security 2014 Quadrennial Homeland Security Review outlines six major challenges that America is facing and will face over the next few years. Those six challenges include: the terrorist threat, cyber threats, biological concerns, nuclear terrorism, transnational criminal organizations and natural hazards (DHS, 2014, 28). The focus of this paper is to address the nature of cyber threats and cyber terrorism in America. When Americans think of the word “terrorism”, most think of the public acts that are carried out against American citizens and broadcasted worldwide. A few that come to mind are the attacks in New York on September 11th and the Boston Marathon bombing in 2012.…

    • 1252 Words
    • 6 Pages
    Superior Essays
  • Superior Essays

    Too much investment on high technology can lead to failure to invest in other necessities such as military training, military police and linguists (37). Linguists are needed as a way to communicate with people of countries where a power has military presence such as the United States in Afghanistan. Hard power used in cyber information can do damage to physical targets in another country destroying the soft power that cyber information can create to attract citizens to that country. An example of this is when malicious software is used by modern companies to shut down processes such as the Stuxnet worm virus inserted into Supervisory Control And Data Acquisition (SCADA) systems that instructed Iranian nuclear facilities to shut down in 2010…

    • 1535 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    There are quite a few government and intelligence agencies including the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), the Department of Homeland Security (DHS), and also state and local law enforcement agencies. With modern day technology becoming so advanced, agencies must find new ways to stay ahead and on top of the security for the nation. The National Security Agency’s mass surveillance has expanded in the years since September 11, 2001. Many people happen to be against government monitoring only because they are unaware of how data is retrieved, analyzed, and stored by the government networks. The process is more than just collecting information from phone calls, emails, and other online communications.…

    • 729 Words
    • 3 Pages
    Improved Essays