🎉   Please check out our new website over at books-etc.com.

Seller
Your price
£22.03
RRP: £29.00
Save £6.97 (24%)
Dispatched within 2-3 working days.

Hacking the Bomb

Cyber Threats and Nuclear Weapons

By (author) Andrew Futter
Foreword by Des Browne
Format: Paperback / softback
Publisher: Georgetown University Press, Washington, DC, United States
Published: 2nd Apr 2018
Dimensions: w 152mm h 229mm d 12mm
Weight: 322g
ISBN-10: 1626165653
ISBN-13: 9781626165656
Barcode No: 9781626165656
Trade or Institutional customer? Contact us about large order quotes.
Synopsis
Are nuclear arsenals safe from cyber-attack? Could terrorists launch a nuclear weapon through hacking? Are we standing at the edge of a major technological challenge to global nuclear order? These are among the many pressing security questions addressed in Andrew Futter's ground-breaking study of the cyber threat to nuclear weapons. Hacking the Bomb provides the first ever comprehensive assessment of this worrying and little-understood strategic development, and it explains how myriad new cyber challenges will impact the way that the world thinks about and manages the ultimate weapon. The book cuts through the hype surrounding the cyber phenomenon and provides a framework through which to understand and proactively address the implications of the emerging cyber-nuclear nexus. It does this by tracing the cyber challenge right across the nuclear weapons enterprise, explains the important differences between types of cyber threats, and unpacks how cyber capabilities will impact strategic thinking, nuclear balances, deterrence thinking, and crisis management. The book makes the case for restraint in the cyber realm when it comes to nuclear weapons given the considerable risks of commingling weapons of mass disruption with weapons of mass destruction, and argues against establishing a dangerous norm of "hacking the bomb." This timely book provides a starting point for an essential discussion about the challenges associated with the cyber-nuclear nexus, and will be of great interest to scholars and students of security studies as well as defense practitioners and policy makers.

New & Used

Seller Information Condition Price
-New£22.03
+ FREE UK P & P

What Reviewers Are Saying

Submit your review
Newspapers & Magazines
A compelling analysis of how information systems associated with nuclear weapons might be vulnerable, what adversaries might do with such vulnerabilities and what all this might mean for strategic stability. * Survival * In this outstanding survey, Andrew Futter explores how the 'cyber challenge' might interact with the nuclear enterprise in general, and nuclear deterrence in particular. . . . To his credit, Futter avoids the hyperbole often used to characterize the cyber threat. His two-level characterization of the cyber challenge (i.e., context and operations) also brings analytical clarity to a subject that lacks a common taxonomy. * The Nonproliferation Review * Futter's valuable book surveys the new dangers and also considers how states might deter cyberattacks on critical infrastructure. He stresses the importance of securing sensitive nuclear information and of keeping control systems as simple as possible and separating them from other networks. * Foreign Affairs * Will resonate well with those interested in nuclear weapons and cyber threats alike. For all others, the content serves as a well-researched point of reference for the intersection of these two ever-present topics in the modern security landscape. * Proceedings * This book is necessary, it is useful, it illustrates where the errors and the loop holes are. Will it actually save us from our selves? Who knows, but hopefully some of the more basic ways of doing so could perhaps be tightened up? * Irish Tech News * Introduces an important puzzle at an extremely relevant time . . . has the potential to be a significant contribution to our limited understanding of the impact of cyber operations on nuclear stability. * H-Diplo * Futter's Hacking the Bomb is a must-read for any policymaker and defense theorist. The cyber domain touches everything, and defense professionals must integrate it into all policies. * H-War * Futter's book reminds us that the world needs norms, for cyber activities in general and for the nuclear-cyber relationship in particular. * H-War *