* [Blog](https://www2.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www2.paloaltonetworks.com/blog/corporate/) * [Cybersecurity](https://www2.paloaltonetworks.com/blog/category/cybersecurity-2/) * The Cybersecurity Canon: ... # The Cybersecurity Canon: @War: The Rise of the Military-Internet Complex [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2015%2F08%2Fthe-cybersecurity-canon-war-the-rise-of-the-military-internet-complex%2F) [](https://twitter.com/share?text=The+Cybersecurity+Canon%3A+%40War%3A+The+Rise+of+the+Military-Internet+Complex&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2015%2F08%2Fthe-cybersecurity-canon-war-the-rise-of-the-military-internet-complex%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2F2015%2F08%2Fthe-cybersecurity-canon-war-the-rise-of-the-military-internet-complex%2F&title=The+Cybersecurity+Canon%3A+%40War%3A+The+Rise+of+the+Military-Internet+Complex&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/2015/08/the-cybersecurity-canon-war-the-rise-of-the-military-internet-complex/&ts=markdown) \[\](mailto:?subject=The Cybersecurity Canon: @War: The Rise of the Military-Internet Complex) Link copied By [Christina Ayiotis](https://www.paloaltonetworks.com/blog/author/christina-ayiotis/?ts=markdown "Posts by Christina Ayiotis") Aug 10, 2015 5 minutes [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown) [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [@War](https://www.paloaltonetworks.com/blog/tag/war/?ts=markdown) [cybersecurity canon](https://www.paloaltonetworks.com/blog/tag/cybersecurity-canon/?ts=markdown) [cyberwarfare](https://www.paloaltonetworks.com/blog/tag/cyberwarfare/?ts=markdown) [Shane Harris](https://www.paloaltonetworks.com/blog/tag/shane-harris/?ts=markdown) [](https://www.paloaltonetworks.com/blog/wp-content/uploads/2015/07/cybersec-canon-red.png) [![cybersec canon red](https://www.paloaltonetworks.com/blog/wp-content/uploads/2015/07/cybersec-canon-red-500x218.png)](https://www.paloaltonetworks.com/blog/wp-content/uploads/2015/07/cybersec-canon-red.png) *We modeled the Cybersecurity Canon after the Baseball or Rock \& Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. [Please write a review and nominate your favorite](https://paloaltonetworks.com/threat-research/cybercanon/nominate-a-book.html).* *The Cybersecurity Canon is a real thing for our community. We have designed it so that you can directly participate in the process. Please do so!* **Book Review by [Canon Committee Member, Christina Ayiotis](https://www.paloaltonetworks.com/threat-research/cybercanon/cyber-security-canon-bios.html):** *@War: The Rise of the Military-Internet Complex* (2014) by Shane Harris ### EXECUTIVE SUMMARY Shane Harris takes us on a journey from the Iraq War "surge" (arguably the first cyber war) to the almost weekly hacks of 2014 to demonstrate the rise of a military-Internet complex and the prescience of Eisenhower's admonition regarding the power of a military-industrial complex. Harris ends *@War* by reminding us that only "**an alert and knowledgeable citizenry** " ensures "**security and liberty may prosper together**." (EMPHASIS ADDED) Harris is a first-rate storyteller providing just enough context (and detail) to enable readers to easily follow the evolution of *cybersecurity* and *cyberwarfare* , and to make them feel like they personally know the important players. As a member of this *Inside the Beltway Cyber Community* (who knows at least one third of the people cited or referenced in the book), I think he's done a terrific job of accurately representing them and their viewpoints. While not very technical, this book should still appeal to the technical community interested in understanding the bigger picture in which they operate. I'd actually make *@War* required reading in high school and college---the next generation needs to better understand all things *cyber*, and the implications of future technological capabilities, as well as their own role and the risks inherent in an increasingly interconnected, wired world. ### REVIEW It is particularly difficult to review a book that has already been [reviewed by professionals at major news outlets](http://www.latimes.com/books/jacketcopy/la-ca-jc-shane-harris-20141123-story.html) and [Think Tanks](http://blogs.cfr.org/cyber/2014/11/04/net-politics-book-review-war/) (not to mention [Amazon](http://www.amazon.com/War-The-Rise-Military-Internet-Complex/dp/0544251792) or [goodreads](http://www.goodreads.com/book/show/20448184-war)). I will not regurgitate what they've already said---I encourage all to read those very good reviews. My bent is looking at the book's value as part of the**Cybersecurity Canon** . Since I take a broad view of the definition of *cybersecurity professional* , I consider *@War* to be foundational, enabling those who comprise the cybersecurity community to better understand the larger geopolitical and economic context in which they live and work. The headlines of the past few years provide the outline of a story and *@War* fills in many of the details. This is a book that any cyber professional can have family members and friends read; once read, they can all have lively, informed discussions on the hot topics of surveillance, espionage, power grabs, etc.---it is that readable and engaging.\[1\] By starting the book with the story of a war hero's success using signals intelligence (SIGINT), Harris predisposes the reader to want to use such techniques to succeed in other contexts. (Most do not know this backstory regarding reduced IED deaths in Iraq, though they probably should---it solidified the "new" way wars are fought.) He doesn't shy away from highlighting the dubious legal validity of certain data-gathering processes and provides much historical context (sometimes from the 2013 "unauthorized disclosures"). He pinpoints exactly when "\[t\]he military-Internet complex was born."\[2\] Harris chronicles in detail how the *Cyber Army* was built, including the role of the private sector. He persuades us that the Internet has become militarized and is now a legitimate battlefield. His detailed account of the creation and evolution of U.S. Cyber Command, including its complicated relationship with the NSA, is important in understanding how the military-Internet complex came about and is evolving. The internecine feuding between the various branches of government responsible for cybersecurity is worthy of its own soap opera. The book gives great context to understand today's major controversies around encryption, bug bounties, and surveillance programs/capabilities negatively impacting U.S.-based technology multinationals. Harris covers the established players, as well as the disruptive upstarts. He drills down into various scandals from Hunton \& Williams' proposed cyber propaganda operation that "killed" HBGary\[3\] to LabMD's FTC woes because of Tiversa.\[4\] Finally, Harris provides unprecedented detail on the role private sector entities play in the "business of defense"---whether it's the commoditization of cyber services for both government and private sector customers (Lockheed's "Cyber Kill Chain"\[5\]) or how threat intelligence services and marketing strategies can influence U.S. policy (Mandiant's APT1 Report---"The government would never have been so bold as to come out with such a report."\[6\]). My only criticism is on the editing front---there should have been no typos (and, in acronym-obsessed D.C., there should not have been a "HIPPA"-like mistake regarding the important classified Presidential Policy Directive). ### CONCLUSION This book tells a compelling story about where cybersecurity is headed, given the "rise of the military-Internet complex," and enables cybersecurity professionals to understand their place in the ecosystem. It should be part of the**Cybersecurity Canon** , as well as required reading for students and CEOs alike. Technological capability is evolving exponentially, and we all need to be prepared to meet the challenges and opportunities presented---*@War* will help on that front. #### POSTSCRIPT ON "ACKNOWLEDGEMENTS" As someone who believes in the importance of expressing gratitude (early and often), I was struck by how thoughtful and heartfelt Harris' three-and-a-half pages of acknowledgements are. ***Cyber*** as a discipline and a profession is ever-evolving; understanding it requires having many diverse, trusted relationships. Properly and creatively recognizing and appreciating them is an art form. \[1\] As a cyber-professional/corporate attorney/former GWU Adjunct Professor of *Information Policy* , I can attest to the importance of books that read like best-selling thrillers. \[2\] Shane Harris,*@War: The Rise of the Military-Internet Complex* (Houghton Mifflin Harcourt 2014), p. 31. \[3\] *Ibid.* , p. 116. \[4\] *Ibid.* , p. 117. \[5\] *Ibid.* , p. 199. \[6\] *Ibid.*, p. 207. *** ** * ** *** ## Related Blogs ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### Cybersecurity Canon Candidate Book Review: "Abundance: The Future Is Better Than You Think](https://www2.paloaltonetworks.com/blog/2018/09/cybersecurity-canon-candidate-book-review-abundance-future-better-think/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown) [#### The Cybersecurity Canon - American Kingpin: The Epic Hunt for the Criminal Mastermind Behind the Silk Road](https://www2.paloaltonetworks.com/blog/2018/01/cybersecurity-canon-american-kingpin-epic-hunt-criminal-mastermind-behind-silk-road/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [#### We're Down to the Last Two Contestants In the 2018 Cybersecurity Canon People's Choice Awards!](https://www2.paloaltonetworks.com/blog/2017/10/last-two-contestants-2018-cybersecurity-canon-peoples-choice-awards/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [#### 2018 Cybersecurity Canon People's Choice Awards: The Final Four](https://www2.paloaltonetworks.com/blog/2017/10/2018-cybersecurity-canon-peoples-choice-awards-final-four/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [#### 2018 Cybersecurity Canon People's Choice Awards: Vote Now for Round 3](https://www2.paloaltonetworks.com/blog/2017/10/2018-cybersecurity-canon-peoples-choice-awards-vote-now-round-3/) ### [Cybersecurity](https://www.paloaltonetworks.com/blog/category/cybersecurity-2/?ts=markdown), [Cybersecurity Canon](https://www.paloaltonetworks.com/blog/category/canon/?ts=markdown) [#### 2018 Cybersecurity Canon People's Choice Awards -- Round 2: Did Your Favorites Make the Cut?](https://www2.paloaltonetworks.com/blog/2017/10/2018-cybersecurity-canon-peoples-choice-awards-round-2-favorites-make-cut/) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language