silikonwashington.blogg.se

Lights out ted koppel
Lights out ted koppel










This is a detail of Ted’s great adventure.

lights out ted koppel

From preppers in Montana, to leaders of the Mormon Church, whose doctrines include planning for cataclysmic events, and more. Much of the book contains details of Koppel’s travels and narratives of the people he meets. While these doomsday and worst-case scenarios are indeed terrifying, never does the book detail the specific how. Throughout the book, Koppel sets up his straw man and uses terms such as imagine, may, could and similar, tenuous phrases. While it’s a disturbing hypothesis, never once does Koppel detail how such an attack would actually take place. The book’s premise is that a major and devastating cyberattack on America’s power grid is imminent. He sets up a straw man question, never fully identifies the threats facing the power grid, and never gives specific weights to those threats, such that the reader is left with Chicken Little meets the power grid. The problem with Ted Koppel’s book is that his approach to the topic is anything but structured and methodical. Yet, with his over 50 years of journalistic experience, this book shows that, just because you are a world-renowned reporter, that doesn’t mean you always get the story right. And read indeed, as his new book Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath is in the Amazon top 200. In the world of broadcast journalism, when Ted Koppel speaks, people listen. Hutton, based around the catchphrase, "When E. One of the most successful television commercials in history was for the financial firm E.

lights out ted koppel

Please do so!īook Review by Canon Committee Member, Ben Rothke: Lights Out: A Cyberattack, A Nation Unprepared, Surviving the Aftermath (2015) by Ted Koppel Executive Summary

lights out ted koppel

We have designed it so that you can directly participate in the process. The Cybersecurity Canon is a real thing for our community. Please write a review and nominate your favorite. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that. We modeled the Cybersecurity Canon after the Baseball or Rock & Roll Hall-of-Fame, except for cybersecurity books.












Lights out ted koppel