permission in writing of Oxford University Press, or as expressly permitted by law, by license, or under terms agreed with the appropriate reproduction rights organization. Inquiries concerning reproduction outside the scope of the above should be sent to the Rights Department, Oxford University Press, at the address above.
You must not circulate this work in any other form
and you must impose this same condition on any acquirer.
Library of Congress Cataloging-in-Publication Data
Singer, P. W. (Peter Warren)
Cybersecurity and cyberwar : what everyone needs to know / Peter W. Singer,
Allan Friedman.
ISBN 978â0â19â991809â6 (hardback)âISBN 978â0â19â991811â9 (paperback)
1. Computer securityâUnited States 2. Computer networksâSecurity
measuresâUnited States. 3. CyberspaceâSecurity measuresâUnited States.
4. CyberterrorismâUnited StatesâPrevention. 5. Information warfareâUnited
StatesâPrevention. I. Title.
QA76.9.A25S562 2014
005.8âdc23
2013028127
1 3 5 7 9 8 6 4 2
Printed in the United States of America
on acid-free paper
ACKNOWLEDGMENTS
Writing a book is often described as a lonely effort, but in reality our journey would not have been possible without a community of supporters behind the scenes.
We would like to thank our editor, David McBride, who first approached us with such a wonderful and important concept and then guided the process to success. The Smith Richardson Foundation and the Brookings Presidentâs Special Initiatives Fund were crucial enablers of the type of long-term work a book project requires, and we particularly appreciate their recognition of the importance of both cybersecurity and collaboration across programs and disciplines. Martin Indyk and Darrell West, respectively the Directors of Foreign Policy and Governance Studies at Brookings, guided our work and, along with Strobe Talbott, the President of Brookings, provided an atmosphere that is all too rare, in which scholarship can be applied to the most pressing issues of the day. A tireless team of staff provided research and editing support, including Emerson Brooking, Joshua Bleiberg, Kevin Li, Jin Rang, and especially Tim Peacock, notable for being never afraid to challenge our thinking and improve upon it. Of particular importance was the role of the remarkably talented and able Brendan Orino, who not only provided support on the research, writing, and editing, but also masterfully organized the entire cyber book campaign. He is an APT wrapped into one person. Jordan and Abby Clayton provided their visual wizardry. A number of colleagues were incredibly generous with their advice and expertise, which sharpened both our thinking and writing, including Ian Morrison, Michael OâHanlon, Ian Wallace, Tammy Schultz, MarkHagerott, Tyler Moore, Jean Camp, Herb Lin, Noah Shachtman, Ken Lieberthal, Beau Kilmer, and Bruce Schneier. We are in deep appreciation of the scores of interviewees, meeting participants, and event and trip hosts who took their time out of busy schedules to aid this work.
On a personal level, Allan would like to thank the unflagging support and love of his wife, Katie, who agreed to marry him in spite of his insistence on talking about cybersecurity constantly and writing about it late into the night.
Peter would like to thank Susan, Owen, and Liam, who make it all worth it, every single moment.
And finally, we would like to thank our parents for many things, but especially for buying those first clunky computers so many years ago.
GLOSSARY
advanced persistent threat (APT): A cyberattack campaign with specific, targeted objectives, conducted by a coordinated team of specialized experts, combining organization, intelligence, complexity, and patience.
Advanced Research Projects Agency (ARPA): Formed in 1958 after the Sputnik launch, the American defense agency dedicated to preventing technological surprises for the United States