A compelling analysis of how information systems associated with nuclear weapons might be vulnerable, what adversaries might do with such vulnerabilities and what all this might mean for strategic stability.
Survival
In this outstanding survey, Andrew Futter explores how the 'cyber challenge' might interact with the nuclear enterprise in general, and nuclear deterrence in particular. . . . To his credit, Futter avoids the hyperbole often used to characterize the cyber threat. His two-level characterization of the cyber challenge (i.e., context and operations) also brings analytical clarity to a subject that lacks a common taxonomy.
The Nonproliferation Review
Futterâs valuable book surveys the new dangers and also considers how states might deter cyberattacks on critical infrastructure. He stresses the importance of securing sensitive nuclear information and of keeping control systems as simple as possible and separating them from other networks.
Foreign Affairs
Will resonate well with those interested in nuclear weapons and cyber threats alike. For all others, the content serves as a well-researched point of reference for the intersection of these two ever-present topics in the modern security landscape.
Proceedings
This book is necessary, it is useful, it illustrates where the errors and the loop holes are. Will it actually save us from our selves? Who knows, but hopefully some of the more basic ways of doing so could perhaps be tightened up?
Irish Tech News
Introduces an important puzzle at an extremely relevant time . . . has the potential to be a significant contribution to our limited understanding of the impact of cyber operations on nuclear stability.
H-Diplo
Futterâs Hacking the Bomb is a must-read for any policymaker and defense theorist. The cyber domain touches everything, and defense professionals must integrate it into all policies.
H-War
Futterâs book reminds us that the world needs norms, for cyber activities in general and for the nuclear-cyber relationship in particular.
H-War