Log In
Or create an account ->
Imperial Library
Home
About
News
Upload
Forum
Help
Login/SignUp
Index
Cover
Title Page
Copyright
Dedication
Contents
Introduction
Part One: Espionage
1. Exploiting Home-Field Advantage
2. Defeating Encryption
3. Building a Backdoor
4. Strategic Espionage
5. Counterintelligence
Part Two: Attack
6. Strategic Sabotage
7. Targeted Disruption
8. Coercion
9. Testing and Demonstration
Part Three: Destabilization
10. Election Interference
11. Exposure
12. Theft, Ransom, and Manipulation
13. Widespread Disruption
Conclusion
Notes
Acknowledgments
Index
← Prev
Back
Next →
← Prev
Back
Next →