- Introduction
- I. Espionage
- 1. Exploiting Home-Field Advantage
- 2. Defeating Encryption
- 3. Building a Backdoor
- 4. Strategic Espionage
- 5. Counterintelligence
- II. Attack
- 6. Strategic Sabotage
- 7. Targeted Disruption
- 8. Coercion
- 9. Testing and Demonstration
- III. Destabilization
- 10. Election Interference
- 11. Exposure
- 12. Theft, Ransom, and Manipulation
- 13. Widespread Disruption
- Conclusion
- Notes
- Acknowledgments
- Index


The Hacker and the State
Cyber Attacks and the New Normal of Geopolitics
Product Details
HARDCOVER
$27.95 • £22.95 • €25.00
ISBN 9780674987555
Publication Date: 02/25/2020