- Introduction
- I. Espionage
- 1. Exploiting Home-Field Advantage
- 2. Defeating Encryption
- 3. Building a Backdoor
- 4. Strategic Espionage
- 5. Counterintelligence
- II. Attack
- 6. Strategic Sabotage
- 7. Targeted Disruption
- 8. Coercion
- 9. Testing and Demonstration
- III. Destabilization
- 10. Election Interference
- 11. Exposure
- 12. Theft, Ransom, and Manipulation
- 13. Widespread Disruption
- Conclusion
- Notes
- Acknowledgments
- Index


The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics
Product Details
PAPERBACK
$19.95 • £17.95 • €18.95
ISBN 9780674271029
Publication Date: 02/08/2022
Educators: Request an Exam Copy (Learn more)
Media Requests: [Email Address]