📖 Overview
Dark Territory traces the history of cyber warfare from its conceptual origins in the 1960s through the development of major cyber operations and policy in the modern era. The book follows key figures in government, military, and intelligence who recognized early on that computer networks could become both weapons and targets.
The narrative covers watershed moments including the first government working groups on computer security, the evolution of offensive cyber capabilities, and pivotal attacks that shaped national policy. Kaplan documents the internal debates and power struggles between agencies as the U.S. government grappled with this new domain of warfare.
Through interviews and declassified materials, the book reveals how military and intelligence officials developed cyber strategies while politicians and the public remained largely unaware of the growing risks. The text examines how different presidential administrations approached cyber security and the gradual shift toward seeing it as a critical national security issue.
The book illustrates how technological advancement consistently outpaces policy and security measures, creating an endless cycle of vulnerability and response. This history raises essential questions about privacy, security, and the nature of warfare in the digital age.
👀 Reviews
Readers found this book accessible for non-technical audiences while providing a thorough chronology of cyber warfare from the 1960s to present. Multiple reviewers noted Kaplan's clear explanations of complex concepts and engaging narrative style.
Liked:
- Deep research and interviews with key figures
- Balance of technical detail and readability
- Historical context and evolution of cyber threats
- Behind-the-scenes accounts of major cyber incidents
Disliked:
- Focus on U.S. government perspective
- Limited coverage of private sector/civilian impacts
- Some repetition between chapters
- Lack of technical depth for IT professionals
"A journalist's account rather than a technical manual" noted one Amazon reviewer. Several Goodreads users mentioned it works better as history than current analysis.
Ratings:
Goodreads: 4.0/5 (2,800+ ratings)
Amazon: 4.4/5 (300+ ratings)
LibraryThing: 3.9/5 (150+ ratings)
Many cybersecurity professionals recommend it as an introduction to the field's history, though not as a technical reference.
📚 Similar books
Countdown to Zero Day by Kim Zetter
The investigation of the Stuxnet virus reveals how nation-states use cyber weapons to sabotage critical infrastructure and engage in digital warfare.
The Cuckoo's Egg by Clifford Stoll A Berkeley systems administrator tracks KGB hackers through government networks in the first documented case of cyber espionage.
This Is How They Tell Me the World Ends by Nicole Perlroth The history of the cyber arms trade exposes how governments acquire and deploy digital weapons in modern warfare.
The Perfect Weapon by David E. Sanger The examination of cyber warfare tactics shows how nations use digital attacks to achieve geopolitical goals without traditional military confrontation.
Sandworm by Andy Greenberg The chronicle of Russian hackers traces their attacks on Ukraine's power grid and the evolution of state-sponsored cyber warfare.
The Cuckoo's Egg by Clifford Stoll A Berkeley systems administrator tracks KGB hackers through government networks in the first documented case of cyber espionage.
This Is How They Tell Me the World Ends by Nicole Perlroth The history of the cyber arms trade exposes how governments acquire and deploy digital weapons in modern warfare.
The Perfect Weapon by David E. Sanger The examination of cyber warfare tactics shows how nations use digital attacks to achieve geopolitical goals without traditional military confrontation.
Sandworm by Andy Greenberg The chronicle of Russian hackers traces their attacks on Ukraine's power grid and the evolution of state-sponsored cyber warfare.
🤔 Interesting facts
🔐 Despite being crucial to modern cybersecurity, the term "cyber war" was first coined in 1993 by RAND analyst John Arquilla - far later than most people assume.
💻 The NSA's first major cyber defense program, codenamed "Eligible Receiver," revealed in 1997 that hackers could potentially take control of the entire Pacific Command's communications using only publicly available tools.
📱 The book reveals that Steve Jobs gave the NSA special access to review the iPhone's security before its public release, showing an early collaboration between Silicon Valley and intelligence agencies.
🌐 Operation "Buckshot Yankee" in 2008 began when a simple USB drive infected Pentagon computers in what became the most significant breach of U.S. military computers ever detected.
⚡ The 2010 Stuxnet virus, which damaged Iran's nuclear facilities, required knowledge of both nuclear physics and industrial control systems - marking the first time a cyber weapon caused physical destruction.