// Comparison
@War vs Sandworm: Which Should You Read?
Two cybersecurity books on Geopolitics, compared honestly: who each is for, what each does best, and which to read first.
Shane Harris on the entanglement of US military doctrine, the intelligence community, and private contractors after cyberspace was declared the fifth warfighting domain.
A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
Andy Greenberg
Long-form journalism on the GRU's hacking operations, the best non-technical book on what state-level cyber actually looks like.
Read this if
Skip this if
Key takeaways
- The Military-Internet Complex is real, profitable, and largely opaque to oversight; Harris names the contractors and traces the dollar flows.
- CYBERCOM's establishment was less doctrine than Pentagon turf consolidation; the book documents the bureaucratic battles candidly.
- Defense and offense are organisationally entangled inside the US government; the conflicts of interest the book describes have only sharpened since publication.
- NotPetya was not a ransomware accident; it was a wartime weapon that overshot.
- Attribution is slow, contested, and political, but it is also possible and increasingly precise.
- The line between cybercrime and statecraft is thinner than the threat-intel literature suggests.
How they compare
We rate Sandworm higher (5/5 against 4/5 for @War). For most readers, that means Sandworm is the primary pick and @War is a useful follow-up.
Both books target beginner-level readers, so the choice is about topic, not difficulty.
@War and Sandworm both cover Geopolitics, Narrative, so reading them in sequence reinforces the same material from different angles.