Key Takeaways
- Iranian‑affiliated cyber actors are actively targeting U.S. energy and water infrastructure, prompting warnings from CISA and other federal agencies.
- The threat landscape is best understood through historical context; nation‑state hacking is a calculated tool of geopolitical strategy, not random chaos.
- Allie Mellen’s book Code War: How Nations Hack, Spy, and Shape the Digital Battlefield provides a comprehensive, experience‑driven analysis of modern cyberwarfare, focusing on China, Russia, and the United States.
- The book dissects landmark attacks (Stuxnet, WannaCry, NotPetya, election interference, Olympics‑related operations) and explains how military doctrine, national history, and strategic objectives shape each country’s cyber posture.
- A forward‑looking section discusses emerging risks from AI‑generated disinformation (“reality does not exist”) and the growing influence of private tech firms as a “Fourth Power” in the digital battlefield.
- Ultimately, the work argues that individuals, businesses, and governments must decide what data and influence they are willing to accept from state and corporate actors.
Overview of Current Threats
Recent months have seen a surge in Iranian‑affiliated cyber activity aimed at critical U.S. infrastructure. The Cybersecurity and Infrastructure Security Agency (CISA), together with other three‑letter agencies, issued an advisory titled “Iranian‑Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure.” The warning highlights that attackers are probing and, in some cases, compromising programmable logic controllers (PLCs) that manage electricity generation, water treatment, and other essential services. While no large‑scale outage has been publicly attributed to these intrusions, the advisory underscores the growing sophistication of state‑linked groups that blend traditional espionage with disruptive capabilities aimed at undermining national resilience during periods of geopolitical tension.
Context of Nation‑State Cyber Operations
To grasp why such attacks occur, it is useful to step back and examine the broader pattern of nation‑state hacking. Cyber operations have evolved from noisy, publicity‑seeking exploits into tightly controlled instruments of statecraft. Nations deploy them to achieve objectives that may be difficult or costly to reach through conventional military or diplomatic means—such as sabotaging an adversary’s nuclear program, influencing elections, stealing intellectual property, or shaping public perception. The motivations are deeply intertwined with each country’s military doctrine, historical experiences, and overarching geopolitical strategy. Consequently, understanding a specific incident requires looking beyond the technical details to the strategic intent behind it.
About the Book – Code War
Allie Mellen’s Code War: How Nations Hack, Spy, and Shape the Digital Battlefield serves as a timely guide to this complex landscape. Mellen, a principal analyst at Forrester and former owner of a technical consultancy, draws on years of hands‑on experience with nation‑state cyber threats and emerging AI risks. Published amid heightened awareness of cyber‑geopolitical interactions, the book aims to dispel the myth that cyberattacks are mysterious, unstoppable forces. Instead, it frames them as deliberate, measurable actions designed to fulfill state objectives.
Key Themes in the Book
The work is organized around several core themes. First, it provides an overview of how cyberattacks and defenses function, highlighting where governments most frequently employ them, their inherent limitations, and the contexts in which they deliver the greatest strategic value. Second, Mellen offers in‑depth breakdowns of some of the most consequential cyber operations of the modern era—including the 2016 U.S. presidential election interference, disruptive attacks on the Olympics, and campaigns targeting Taiwan, Ukraine, and Tibet. Each case study traces the attack’s planning, execution, and aftermath, illustrating how technical success translated into geopolitical impact. Third, the book devotes extensive sections to the cyber histories and tactics of the three most active actors: China, Russia, and the United States. By contrasting their approaches, Mellen reveals how differing political cultures and strategic priorities produce distinct cyber signatures.
Author’s Perspective and Insights
Mellen’s personal reflections enrich the analytical narrative. She notes that the book’s early chapters ground daily headlines in verifiable stories, helping readers move beyond sensationalism to a nuanced understanding of cause and effect. Part IV, titled “The Future,” proved especially compelling to her. In Chapter 43, “Three Broken Promises,” she argues that the unipolar world dominated by the United States has given way to a multipolar contest where influence is constantly negotiated. The chapter contends that leadership in the U.S., China, and Russia is failing to honor the social contracts they have with their citizens, creating domestic vulnerabilities that adversaries exploit via cyber means.
The discussion then shifts to the rise of artificial intelligence as a transformative factor. Mellen labels AI the “Fourth Power,” suggesting that machine‑learning models, data pipelines, and algorithmic decision‑making now sit alongside traditional military, economic, and diplomatic levers of state power. Chapter 45’s provocative claim that “reality does not exist” captures the concerns around AI‑generated disinformation: when models can be tuned to produce preferred narratives, the line between fact and fabrication blurs, eroding shared trust. The author warns that in this environment, the battle is no longer just for territory or resources but for the very credibility of information that shapes public opinion and policy choices.
Implications for Policy and Practice
For practitioners, the book offers actionable takeaways. Recognizing that nation‑state actors seek data and influence over worldviews helps organizations prioritize protection of sensitive information and resilience against manipulation campaigns. Mellen emphasizes that defenders must move beyond purely technical controls to incorporate strategic communication, media literacy, and collaboration with government intelligence sharing platforms. Moreover, the analysis of AI’s role urges firms and governments to invest in model transparency, auditability, and robust validation processes to mitigate the risk of adversarial AI shaping perceptions.
At the governmental level, the work reinforces the need for clear doctrines that define acceptable cyber behavior, proportionate responses, and norms of conduct in peacetime and conflict. It also highlights the importance of public‑private partnerships, given that much of the critical infrastructure under threat is owned and operated by private entities. By aligning national cyber strategies with the realities outlined in Code War, policymakers can better anticipate adversary moves and craft defenses that are both technically sound and strategically coherent.
Conclusion
Code War succeeds in turning the abstract specter of nation‑state hacking into a concrete, comprehensible phenomenon grounded in history, strategy, and human agency. Mellen’s blend of technical expertise, analytical rigor, and accessible storytelling makes the book valuable for a wide audience—from corporate security teams and government officials to scholars and engaged citizens interested in the evolving weapons of 21st‑century warfare. As the digital battlefield continues to expand, the insights offered herein provide a vital framework for understanding not only what has happened, but also how nations—and the individuals they seek to influence—will navigate the challenges ahead.

