Skip to main content
  • Sections
  • Search

Center for Strategic & International Studies

User menu

  • Subscribe
  • Sign In

   Ranked #1 Think Tank in U.S. by Global Go To Think Tank Index

Topics

  • Climate Change
  • Cybersecurity and Technology
    • Cybersecurity
    • Data Governance
    • Intelligence, Surveillance, and Privacy
    • Military Technology
    • Space
    • Technology and Innovation
  • Defense and Security
    • Counterterrorism and Homeland Security
    • Defense Budget
    • Defense Industry, Acquisition, and Innovation
    • Defense Strategy and Capabilities
    • Geopolitics and International Security
    • Long-Term Futures
    • Missile Defense
    • Space
    • Weapons of Mass Destruction Proliferation
  • Economics
    • Asian Economics
    • Global Economic Governance
    • Trade and International Business
  • Energy and Sustainability
    • Energy, Climate Change, and Environmental Impacts
    • Energy and Geopolitics
    • Energy Innovation
    • Energy Markets, Trends, and Outlooks
  • Global Health
    • Family Planning, Maternal and Child Health, and Immunizations
    • Multilateral Institutions
    • Health and Security
    • Infectious Disease
  • Human Rights
    • Civil Society
    • Transitional Justice
    • Human Security
  • International Development
    • Food and Agriculture
    • Governance and Rule of Law
    • Humanitarian Assistance
    • Private Sector Development
    • U.S. Development Policy

Regions

  • Africa
    • North Africa
    • Sub-Saharan Africa
  • Americas
    • Caribbean
    • North America
    • South America
  • Arctic
  • Asia
    • Afghanistan
    • Australia, New Zealand & Pacific
    • China
    • India
    • Japan
    • Korea
    • Pakistan
    • Southeast Asia
  • Europe
    • European Union
    • NATO
    • Post-Soviet Europe
    • Turkey
  • Middle East
    • The Gulf
    • Egypt and the Levant
    • North Africa
  • Russia and Eurasia
    • The South Caucasus
    • Central Asia
    • Post-Soviet Europe
    • Russia

Sections menu

  • Programs
  • Experts
  • Events
  • Analysis
    • Blogs
    • Books
    • Commentary
    • Congressional Testimony
    • Critical Questions
    • Interactive Reports
    • Journals
    • Newsletter
    • Reports
    • Transcript
  • Podcasts
  • iDeas Lab
  • Transcripts
  • Web Projects

Main menu

  • About Us
  • Support CSIS
    • Securing Our Future
CSIS PRESENTS
Past Event
Share
  • LinkedIn
  • Facebook
  • Twitter
  • Email
  • Printfriendly.com

Book Discussion: The Perfect Weapon: War, Sabotage, and Fear in the Cyber Age

Thursday, September 27, 2018 5:00 pm - 6:30 pm
CSIS Headquarters


Agenda:

5:00 p.m. - 5:30 p.m. - Pre-Event Reception
5:30 p.m. - 6:30 p.m. - Event

Bookselling and signing to follow the event.

For seventy years, the thinking inside the Pentagon was that only nations with nuclear weapons could threaten America’s existence. But that assumption is now in doubt: in a world in which almost everything is interconnected—phones, cars, electrical grids, and satellites—everything can be disrupted, if not destroyed. In THE PERFECT WEAPON, New York Times national security correspondent and bestselling author David Sanger vividly details how this new revolution, being conducted largely in secret, is reshaping global power.
 
Focusing largely on the “Seven Sisters” of cyber conflict—the United States, Russia, China, Britain, Iran, Israel, and North Korea—THE PERFECT WEAPON is the dramatic story of how cyber conflict has expanded since the revelation of the American/Israeli attacks on Iran’s nuclear program. Sanger exposed the story of Washington’s role in those attacks six years ago, in his book CONFRONT AND CONCEAL. Now he explores how great and small powers alike have moved into a new era of constant sabotage, misinformation, and fear, in which everyone is a target.

A decade ago, there were three or four nations with effective cyber forces; now there are more than thirty. As of early 2018, the best estimates suggest there have been upward of two hundred state-on-state cyberattacks over the past decade or so—a figure that describes only those that have become public. Yet as the global cyber conflict took off, America turned out to be remarkably unprepared. Its own weapons were stolen from the American arsenal by a group called Shadow Brokers and were quickly turned against the United States and its allies. Even while the United States built up a powerful new Cyber Command, it had no doctrine for how to use it. Deterrence failed. When under attack—by Russia, China, Iran or North Korea—the government was often paralyzed, unable to use cyberweapons when America’s voting system, its electrical system, and even routers in citizens’ homes had been infiltrated by foreign hackers. American citizens, Sanger concludes, have become the collateral damage in a war being fought in foreign computer networks and along undersea cables.

Moving from the White House Situation Room to the dens of Chinese government hackers to the boardrooms of Silicon Valley, the uniquely sourced THE PERFECT WEAPON shares never-before-revealed details of Trump Administration battles over preemptive cyber strikes; America’s constant cyberwar with North Korea; a cyber battle with Russia that preceded—and predicted—the 2016 election attacks; and more.
 
As the Russian interference in our 2016 election, China’s theft of personal data, and North Korea’s ingenious attacks on American companies show, American technology firms are also major players. And that is how this era differs from the Cold War: the key strategic decisions are being made not only in the Situation Room, but in corporate boardrooms, where everything from Facebook’s monitoring of election posts to Apple’s battles with the FBI over encryption play out. The biggest decisions may not be under the president’s control.

For years, David Sanger has been one of the biggest voices in American journalism on the challenges to the country’s national security. With THE PERFECT WEAPON he explains how far more complex the emergence of cyber weapons has made a world that is already afire.
 

This event is made possible through general support to CSIS.

Featuring
David Sanger
Author of the Perfect Weapon, Chief Washington Correspondent, The New York Times
James Andrew Lewis
Senior Vice President, CSIS
CSIS Experts
Bob Schieffer
CSIS Trustee
Contact
Contact Jackie Ramsay
Media Queries

Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Caleb Diamond
Media Relations Manager and Editorial Associate
Tel: 202.775.3173

Related Content

On Demand Event
Online Event: “The Perfect Weapon”: Cyber Policy and the Incoming Biden Administration
December 2, 2020
Transcript
Schieffer Series: The Iran Situation
September 25, 2019
Commentary
The Strategic Implications of the Strikes on Saudi Arabia
By Anthony H. Cordesman
September 16, 2019
Commentary
Iran and Cyber Power
By James Andrew Lewis
June 25, 2019
Commentary
From Competition to Confrontation with China: The Major Shift in U.S. Policy
By Anthony H. Cordesman
August 3, 2020
Transcript
Global Partnerships to Combat Cybercrime & the Challenge of Going Dark
December 6, 2019
Transcript
Schieffer Series: The Kremlin Playbook 2: The Enablers
March 11, 2019
Commentary
Dismissing Cyber Catastrophe
By James Andrew Lewis
August 17, 2020
Footer menu
  • Topics
  • Regions
  • Programs
  • Experts
  • Events
  • Analysis
  • Web Projects
  • Podcasts
  • iDeas Lab
  • Transcripts
  • About Us
  • Support Us
Contact CSIS
Email CSIS
Tel: 202.887.0200
Fax: 202.775.3199
Visit CSIS Headquarters
1616 Rhode Island Avenue, NW
Washington, DC 20036
Media Queries

Contact H. Andrew Schwartz
Chief Communications Officer
Tel: 202.775.3242

Contact Caleb Diamond
Media Relations Manager and Editorial Associate
Tel: 202.775.3173

Daily Updates

Sign up to receive The Evening, a daily brief on the news, events, and people shaping the world of international affairs.

Subscribe to CSIS Newsletters

Follow CSIS
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube
  • Instagram

All content © 2020. All rights reserved.

Legal menu
  • Credits
  • Privacy Policy
  • Reprint Permissions