IE 11 Not Supported

For optimal browsing, we recommend Chrome, Firefox or Safari browsers.

A History of Global Hacking — and Where It’s Going Next

In her new book, Code War: How Nations Hack, Spy, and Shape the Digital Battlefield, Allie Mellen provides true stories of the current cyber war and, importantly, what might be ahead.

Close-up of a hacker's hands typing on a keyboard in a dark room, overlaid with a map and a line graph.
Adobe Stock/lev dolgachov
In the midst of recent battles with Iran and their global partners, U.S. public- and private-sector organizations are also battling to secure critical infrastructure in a time of war. Federal agencies recently warned that Iranian hackers are targeting U.S. energy and water sectors.

For example, the Cybersecurity and Infrastructure Security Agency and other three-letter agencies released this advisory: “Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure.”

But backing up a bit, many thoughtful readers are interested in more context, history, examples and deeper-dive stories of what has happened, is happening now and will be happening in the future regarding nation-state hacking.

Which is where a new book by Allie Mellen is so helpful. Mellen is principal analyst for Forrester, and she has owned and operated a successful technical consultancy during her career. Her book covers a wide range of topics and stories related to various cybersecurity themes, trends, power structures and hacking activities by China, Russia and more.
code war.png
Here is the abstract for Code War from Amazon:

“Cyberattacks are the ultimate geopolitical weapon of the 21st century. They are used to damage presidential campaigns, shut down electric grids, sway public sentiment, and cost businesses and governments alike billions of dollars.

“Popular culture portrays cyberattacks as unstoppable and mysterious actions taken by shadowy, unpredictable forces.

“They aren’t. Code War: How Nations Hack, Spy, and Shape the Digital Battlefield shatters this depiction, revealing nation-state cyberattacks for what they are: calculated, measured actions to achieve state objectives.

“World-renowned cybersecurity expert Allie Mellen draws on her extensive experience with nation-state cyberattacks and AI threats to break down how and why nations deploy cyberattacks in their own unique ways, driven by their military doctrine, national history, and, most importantly, geopolitical strategy.

“Mellen deconstructs the most infamous cyberattacks of our time to reveal how and why attacks like Stuxnet, WannaCry, and NotPetya happened and how their success altered the international landscape. She juxtaposes these attacks against the brutal reality of how nations surveil, manipulate, and control their own citizens’ data.

“An essential resource for individuals, business professionals, and government officials, Code War demonstrates how you can use this knowledge to understand and respond to the practical realities of nation-state cyberattacks.

“Readers will also find:
  • An overview of how cyberattacks and defenses operate, where governments most frequently use them, their limitations, and where they provide the most value
  • An in-depth breakdown of some of the most important cyberattacks of the modern age, including those targeting the 2016 US Presidential elections, the Olympics, and those against Taiwan, Ukraine, and Tibet
  • Deep dives into the histories and attacks perpetrated by governments with the most prolific cyberattacks: China, Russia, and the United States
“An eye-opening guide to the world of nation-state cyberattacks, Code War is a must-read for business and government leaders responsible for protecting against these attacks. It’s also a fascinating look into the world of cyberattacks for anyone interested in international relations who wants to keep up with the evolving weapons of war.”

Some of the topics covered in Code War are shown here:
code war2.jpg
In addition, there are detailed sections on Russia and China hacking, with stories and great examples provided like crypto wars, Olympic games, “Beijing’s Trojan Dragon,” disinformation and much more.

MY THOUGHTS ON CODE WAR


I really enjoyed this book for several reasons.

First, the overview of our current cybersecurity situation globally is packed with true stories and examples that put the headlines we see every day into context.

Second, I found Part IV on the future to be very insightful and helpful. Here’s how Chapter 43, “Three Broken Promises,” opens:

“Though the United States remains the world’s leading power, it now operates in a competitive environment where influence is increasingly contested. The unipolar era has ended, and the coming decades will define the balance of power in a world no longer centered on a single place.

“Here’s the wrench that is being thrown in the works of all three of these nations — the United States, China and Russia: Leadership across the board is failing to live up to the social contracts it has established with its people.”

The chapter then describes the challenges in all three countries. Part IV goes on to discuss the changes coming with NVIDIA and AI, which the author calls “The Fourth Power.”

In Chapter 45, the case is made that “reality does not exist.” Here is how that chapter ends:

“AI providers are capable of adjusting their models to craft the reality they or the government wants us to have. Visibility into its decisions that models make, opaque, which makes it even more difficult to understand why they produced the outputs they did.

“We have come further than the disinformation-ridden world of the past. We are firmly in a world where reality no longer exists. It is what we decide. Nations, enterprises, and individuals face a battle for believability.”

Finally, in the conclusion in Chapter 45, we see this:

“The one through line in this book is you.

“What do nation-states want? Your data. What do they want to influence? Your worldview. What are you to them? Someone to protect or to persecute.

“What do tech companies want? Your data. What do they want to keep? Your attention. What are you to them? A user to serve and a resource to exploit.”

Mellen elaborates on how cybersecurity is so critical to this conversation and closes with this: “We get to chose what we demand from governments and companies — and what we are no longer willing to accept.”

FINAL THOUGHTS


For decades, Paul Harvey, a legendary American radio broadcaster, famously said “And now you know ... the rest of the story.”

Thoughtful readers still want to know what has happened in our recent global history with technology and hacking. How did we get to this point in 2026 between nation-states and criminal hackers, and where we are going next?

Before focusing on AI hacking and cybersecurity in the future, this book will help you understand the rest of the story regarding the importance of data and the impact on you and your customers.
Daniel J. Lohrmann is an internationally recognized cybersecurity leader, technologist, keynote speaker and author.