by clicking on the page. A slider will appear, allowing you to adjust your zoom level. Return to the original size by clicking on the page again.
the page around when zoomed in by dragging it.
the zoom using the slider on the top right.
by clicking on the zoomed-in page.
by entering text in the search field and click on "In This Issue" or "All Issues" to search the current issue or the archive of back issues respectively.
by clicking on thumbnails to select pages, and then press the print button.
this publication and page.
displays a table of sections with thumbnails and descriptions.
displays thumbnails of every page in the issue. Click on a page to jump.
allows you to browse through every available issue.
FCW : March 15, 2015
concept, but it is a fairly new practice. One of the pivotal moments came in 2007, during the surge of U.S. forces in Iraq, according to Harris. He profiles Bob Stasio, then an Army lieutenant whose signals- intelligence platoon is credited with tracking down hundreds of insurgents. He used cell phone signals to determine insurgents’ locations and sent reports back to commanders to correlate the data with a wider view of the battlefield. Stasio’s handiwork was made possible by President George W. Bush’s decision to unleash NSA’s cyber capabilities, Harris writes. In a May 2007 meeting with then- Director of National Intelligence Mike McConnell, Bush signed off on NSA’s use of computer viruses and spyware to penetrate the communication networks of Iraqi insurgents. That cyber arsenal helped quell the Iraqi insurgency at the time, but it was not without hazards. Collateral damage is as real a possibility in cyberspace as in other types of warfare, and the malware risked infecting the devices of innocent Iraqis and spreading further. The U.S. military’s surge in Iraq allowed NSA to use cyber weapons it had been stockpiling for years, Harris writes, and he describes how NSA buys them from defense contractors that acquire them from third-party vendors. The hoarding of cyber weapons bolsters U.S. offensive capabilities but leaves Internet users in the dark about software and hardware flaws that then remain unpatched. Harris also details other turning points in federal cybersecurity policy, including Operation Buckshot Yankee, the Pentagon’s response to a 2008 breach of its classified systems. One of the most important lines in “@War,” however, comes in its preface and is informed by the dogged reporting that gives the book such value. Pushing back against the tendency of government officials to decline to discuss cybersecurity because it pertains to “classified” information, Harris writes, “The public cannot understand these issues, and governments can’t make sound law and policy, without candid and frank discussions in the light of day.” If every journalist covering cybersecurity had those words hanging above his or her desk, cyberspace would be less murky. “@War” does use extensive anonymous — along with many on-the-record — sources, but Harris explains his criteria for offering anonymity while noting the considerable risk that intelligence sources take in talking to journalists. The refrain from government officials that classified information gives them a unique ability and privilege to combat cyberthreats needs to be evaluated against public evidence. Harris makes this point by recounting a 2009 meeting between federal officials and security personnel from some of the top U.S. banks. When an FBI official asked how a program to share cyberthreat information between the government and the financial industry was progressing, a bank representative expressed disappointment, Harris writes. The report the FBI had shared with the banks had drawn on classified information and included threat-signature details, but the banks had already obtained that information by sharing it with one another or buying it from private security firms. That meeting illustrates a theme that courses through Harris’ book: There is no hegemon in cyberspace. The Tor network, a routing tool originally funded by the U.S. government, has thwarted NSA’s efforts to identify Internet users. Chinese hackers have dealt costly blows to Internet leviathans such as Google. Cyberspace is as contested as ever. And that’s what makes this account of its militarization so important. n “ The public cannot understand these issues, and governments can’t make sound law and policy, without candid and frank discussions in the light of day.” Shane Harris March 15, 2015 FCW.COM 29 0315fcw_028-029.indd 29 2/23/15 3:48 PM
March 30, 2015