Hacking the Bomb
![]() 212 pp., 6 x 9 Hardcover ISBN: 9781626165649 (1626165645) 212 pp., 6 x 9 Paperback ISBN: 9781626165656 (1626165653) eBook ISBN: 9781626165663 E-Inspection Request E-Inspection April 2018 LC: 2017035576 EXPLORE THIS TITLE DescriptionTable of Contents Reviews |
Hacking the Bomb
Cyber Threats and Nuclear Weapons
Andrew Futter
Foreword by Lord Des Browne
Finalist for the 2019 PROSE Award in Government and Politics of the Association of American Publishers
Are nuclear arsenals safe from cyber-attack? Could terrorists launch a nuclear weapon through hacking? Are we standing at the edge of a major technological challenge to global nuclear order? These are among the many pressing security questions addressed in Andrew Futter's ground-breaking study of the cyber threat to nuclear weapons. Andrew Futter is an associate professor in the School of History, Politics, and International Relations at the University of Leicester. He is the author of The Politics of Nuclear Weapons and Ballistic Missile Defence and US National Security Policy, the editor of The United Kingdom and the Future of Nuclear Weapons, and co-editor of Reassessing the Revolution in Military Affairs.
Reviews
"A compelling analysis of how information systems associated with nuclear weapons might be vulnerable, what adversaries might do with such vulnerabilities and what all this might mean for strategic stability."—Survival "In this outstanding survey, Andrew Futter explores how the 'cyber challenge' might interact with the nuclear enterprise in general, and nuclear deterrence in particular. . . . To his credit, Futter avoids the hyperbole often used to characterize the cyber threat. His two-level characterization of the cyber challenge (i.e., context and operations) also brings analytical clarity to a subject that lacks a common taxonomy."—The Nonproliferation Review "Futter's valuable book surveys the new dangers and also considers how states might deter cyberattacks on critical infrastructure. He stresses the importance of securing sensitive nuclear information and of keeping control systems as simple as possible and separating them from other networks."—Foreign Affairs "Will resonate well with those interested in nuclear weapons and cyber threats alike. For all others, the content serves as a well-researched point of reference for the intersection of these two ever-present topics in the modern security landscape."—Proceedings "This book is necessary, it is useful, it illustrates where the errors and the loop holes are. Will it actually save us from our selves? Who knows, but hopefully some of the more basic ways of doing so could perhaps be tightened up?"—Irish Tech News ""If you are bothered by the fact that our top security officials cannot determine with high confidence whether computer malware or other hacking could cause Russian, Chinese, or U.S. nuclear missiles to be illicitly fired, you should read this book. If you are bothered by the fact that cyber operations could confuse leaders into launching nuclear missiles during a crisis, you should read this book. If you are not bothered because you are not aware of such dangers, you should read this book. Professor Futter asks all the right questions about the myriad dangers that information warfare poses to the command and control of nuclear forces, and illuminates the answers to the extent that current knowledge allows. His important and provocative book also connects the cyber issues to the major risks of nuclear instability and accidents, providing rich context for his analysis. A cross between historical investigation, policy analysis, and theory, this is a must-read volume for anyone who cares about this perilous new threat to mankind."—Bruce G. Blair, Research Scholar, Princeton University. Co-Founder, Global Zero "Introduces an important puzzle at an extremely relevant time . . . has the potential to be a significant contribution to our limited understanding of the impact of cyber operations on nuclear stability."—H-Diplo "Nuclear strategy is hard - but cyber operations makes it harder. In this thorough and insightful work, Andrew Futter skillfully weaves the many threads binding cyberspace and the nuclear establishment to urge caution for those who would ignore or promote cyberwar on nuclear capabilities. Strategists of all flavors, take note."—Martin Libicki, Author, Cyberspace in Peace and War "In his deeply researched and artfully written Hacking the Bomb, Andrew Futter has added a key nuance: the machines upon which the complex systems that command and control nuclear weapons depend may themselves become prisoners of skillful hackers."—Political Science Quarterly "Futter's Hacking the Bomb is a must-read for any policymaker and defense theorist. The cyber domain touches everything, and defense professionals must integrate it into all policies."—H-War "Futter's book reminds us that the world needs norms, for cyber activities in general and for the nuclear-cyber relationship in particular."—H-War Table of Contents Foreword by The Rt. Hon. Lord Browne of Ladyton Acknowledgments Introduction: WarGames Redux? Part 1: The Nature of the Challenge 1. What Exactly Do We Mean by the Cyber Challenge? 2. How and Why Might Nuclear Systems Be Vulnerable? Part 2: What Might Hackers Do to Nuclear Systems? 3. Stealing Nuclear Secrets 4. Could Cyberattcks Lead to Nuclear Use or Stop Systems from Working? Part 3: The Cyber-Nuclear Nexus at the Strategic Level 5. Cyberdeterrence, Nuclear Weapons, and Managing Strategic Threats 6. A Cyber-Nuclear Security Dilemma, Nuclear Stability, and Crisis Management Part 4: Challenges for Our Cyber-Nuclear Future 7. Nuclear Weapons Modernization, Advanced Conventional Weapons, and the Future Global Nuclear Environment Conclusion:Managing Our Cyber-Nuclear Future Bibliography Index About the Author |