Hacked

Title:                      Hacked

Author:                Charlie Mitchell.

Mitchell, Charlie (2016). The Inside Story of America’s Struggle to Secure Cyberspace. Lanham, MD: Rowman & Littlefield

LCCN:    2016006180

TK5105.875 .I57 M575 2016

Contents

  • “Carry out our demand if you want to escape us” — The first cyber president — Sirens on Capitol Hill — To build a framework — The department of insecurity — The telecom challenge — The FTC, “protecting America’s consumers” — Fear and failure, again, on Capitol Hill — The information-sharing matrix — A new congress brings a new energy to cyber debate — The promise and peril of “strong encryption” — Cyber tensions define the U.S.-China relationship — Help wanted, desperately, for cybersecurity — Senate debate takes shape, then “surprise!” stalls — At long last, the political system arrives at an answer — The unfinished journey.

Subjects

Additional formats

  • Online version: Mitchell, Charlie, 1962- author. Inside story of America’s struggle to secure cyberspace Lanham : Rowman & Littlefield, [2016] 9781442255227 (DLC) 2016016849

Date Posted:      October 27, 2016

Reviewed by The Intelligencer[1]

The cyberattack on Sony Pictures and costly hacks to Sony, Target, Home Depot, Neiman Marcus, and databases containing sensitive data on millions of US federal workers[2] shocked the nation. Despite a new urgency the hacks keep coming from China, Russia, Iran, North Korea, the Middle East, and points unknown. They raise a deeply disturbing question: is it beyond the reach of government and tech leaders to resolve? Describes hapless government and industry responses to growing cybersecurity threats. Examines the internal power struggles in the federal government, the paralysis on Capitol Hill, and the industry’s desperate effort to stay ahead of both the bad guys and the government.

[1] The Intelligencer: Journal of U.S. Intelligence Studies (22, 2, Spring 2016, p. 140).

[2] See The Intelligencer: Journal of U.S. Intelligence Studies (22, 2, Spring 2016, p. 3-4

This entry was posted in Cybersecurity and tagged . Bookmark the permalink.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s