@War: The Rise of the Military-Internet Complex

Home > Other > @War: The Rise of the Military-Internet Complex > Page 32
@War: The Rise of the Military-Internet Complex Page 32

by Shane Harris


  drives, USB. See thumb drives

  drone technology, [>], [>], [>], [>], [>], [>], [>]

  Eastern Europe, [>], [>], [>], [>], [>]

  eBay, [>]

  Egypt, [>]

  Eisenhower, Dwight, [>], [>], [>]

  electrical power systems, [>], [>], [>]–[>], [>], [>], [>], [>], [>] n. [>]. See also critical infrastructures

  Electronic Privacy Information Center, [>]

  e-mail: BlackBerry, [>]; cyber breaches, [>], [>], [>], [>]; FBI sting, [>]–[>]; of foreigners vs. Americans, [>]–[>], [>]; Gmail, [>], [>], [>], [>]; Hotmail, [>]; and the Iraq War, [>], [>], [>], [>], [>], [>]; monitoring, [>], [>], [>], [>], [>]–[>], [>], [>], [>]–[>]; Outlook, [>], [>], [>]; posing as legitimate, [>], [>], [>], [>] (see also malware, e-mail as vehicle for; spear-phishing; spyware, vehicles for); security, [>], [>], [>], [>]–[>], [>], [>]; strategies for anonymity, [>], [>], [>]

  embassies, [>], [>], [>]–[>]

  encryption, [>], [>], [>]–[>], [>], [>], [>], [>], [>], [>]

  encryption key, [>], [>]

  Endgame, [>], [>]–[>], [>], [>]

  energy resources. See electrical power systems; nuclear facilities; petroleum power systems

  engineering, reverse, [>]

  England, Gordon, [>]

  Estonia, [>]

  ethical issues: cyber offense by private companies, [>]; how sold information is used, [>], [>]; placement of blame for zero day attack, [>]; responsibility to disclose vulnerabilities, [>], [>]–[>], [>]–[>], [>]

  Facebook, [>], [>], [>], [>], [>]

  Federal Bureau of Investigation (FBI), [>], [>]–[>], [>], [>]–[>], [>], [>]–[>], [>]–[>], [>], [>]

  fiber-optic trunk lines, [>], [>], [>]

  Fick, Nathaniel, [>]–[>]

  fifth domain, cyberspace as the, [>], [>], [>], [>], [>]

  file-sharing networks, [>]–[>]

  financial and banking data systems: clearinghouse network, [>]; cyber breaches, [>]–[>], [>]–[>]; cyber security, [>], [>], [>]–[>], [>]–[>], [>], [>]; denial-of-service attacks, [>], [>], [>], [>], [>]; hack-back against Citadel, [>]–[>]; risks of malware use in military context, [>]–[>], [>]. See also critical infrastructures

  FinFisher software, [>]–[>], [>]

  FireEye, [>], [>]

  Firefox, [>]

  First Amendment, [>]

  FISA. See Foreign Intelligence Surveillance Act

  Flatliquid operation, [>]–[>], [>] n. [>]

  Foreign Intelligence Surveillance Act (FISA), [>], [>]–[>], [>]

  Foreign Intelligence Surveillance Court, [>], [>]–[>], [>]

  foreign policy, US: for China, [>]–[>], [>]–[>]; international cyber agreements, [>], [>]; and monitoring of foreigners, [>], [>]–[>], [>], [>], [>], [>]

  forensics, network, [>], [>]–[>], [>], [>], [>]

  Fourth Amendment, [>], [>], [>], [>], [>]

  France, [>]–[>], [>]–[>], [>]

  F-35. See Joint Strike Fighter

  future innovations in cyber security, [>]–[>]

  future scenario for cyberspace, [>]–[>]

  fuzzing, [>]–[>]

  Gates, Robert, [>], [>], [>], [>]–[>], [>], [>], [>], [>], [>]

  gateways, [>], [>]

  Google: alliance with NSA, [>], [>], [>], [>], [>]–[>], [>]; China market, [>]; cyber security, [>]–[>], [>], [>], [>]; distributed computing, [>]; Gmail, [>], [>], [>], [>]; NSA’s secret monitoring of, [>], [>]; retaliation against China, [>]–[>], [>], [>] n. [>]; telecommunications networks, [>]; user statistics, [>]

  gray market, [>], [>], [>], [>], [>]

  hack-backs, [>], [>], [>], [>]–[>], [>], [>]

  hackers: anonymity, [>], [>], [>], [>], [>]; catching (see hackers, catching); conferences, [>], [>], [>], [>]; freelance, [>], [>]–[>]; groups (see Anonymous; LulzSec); hacktivists, [>], [>]; mercenaries, [>]–[>], [>]; within the NSA (see Tailored Access Operations); as pirates/privateers, [>]; retaliation against (see hack-backs; private sector, retaliation by); trained for US cyber warfare, [>]–[>], [>], [>], [>], [>]–[>], [>], [>], [>]; “white hat” and “black hat,” [>], [>]

  hackers, catching: bounty system, [>]; FBI activities, [>]–[>]; honeypots, [>], [>], [>], [>]; imposter server, [>]; network forensics, [>], [>]–[>], [>], [>], [>]; private companies as bait, [>]–[>], [>], [>]–[>]

  Hacking Team, [>]–[>]

  Hammond, Jeremy, [>]–[>], [>]

  Harris Corporation, [>]

  Hayden, Lt. Gen. Michael, [>]–[>], [>], [>]

  honeypot, [>], [>], [>], [>]

  Hu, Jintao, [>]

  Huawei, [>]

  Hunton Williams, [>]. See also Team Themis

  Hutchins, Eric, [>], [>]–[>]

  IBM, [>], [>], [>]

  iDefense, [>]

  India, [>]

  informants, [>], [>]–[>], [>], [>]

  Information Operations Center (IOC), [>]

  Information Operations Command, [>]

  In-Q-Tel, [>], [>]

  intellectual property, cyber theft: by China, [>], [>]–[>], [>], [>]–[>], [>], [>]–[>], [>], [>], [>] n. [>] (see also private sector, retaliation); of Google, [>]–[>], [>] n. [>]; of Target, [>], [>]

  Internet: anonymity, [>], [>], [>], [>], [>]; anticensorship projects, [>], [>]; as a battlefield, [>]–[>], [>]; domain issues, [>], [>]; gateways, [>], [>]; illegal activities (see cybercrime); inherent vulnerability in access to, [>], [>], [>]; invention, [>]; military-Internet complex, [>]–[>], [>], [>], [>]–[>], [>], [>]

  Internet browsers, [>]

  Internet cafes, [>]–[>], [>]

  Internet protocol addresses: compilation (see Defense Industrial Base; Prism data collection); hiding (see Internet, anonymity); private companies that provide (see mercenaries); security, [>], [>], [>], [>]

  Internet Security Systems, [>]

  Internet service providers: during bank cyber breach, [>], [>]; CIA installation of spyware, [>]; concerns working with US government, [>], [>], [>]–[>]; and the NSA, [>]–[>], [>]–[>], [>], [>], [>], [>], [>]; as Tier [>], [>]

  IOC. See Information Operations Center

  Iran, [>], [>], [>], [>], [>]–[>]. See also Stuxnet program

  Iraq, [>], [>], [>]–[>], [>], [>], [>], [>], [>], [>]–[>], [>]

  Ironavenger operation, [>]

  Israel, [>], [>]

  Italy, [>]–[>]

  Izz ad-Din al-Qassam Brigades, [>], [>]

  Johnson & Johnson, [>]

  Joint Chiefs of Staff, [>], [>]–[>], [>]

  Joint Special Operations Command (JSOC), [>], [>], [>]–[>], [>]

  Joint Strike Fighter (F-35), [>]–[>], [>], [>], [>]

  keystroke monitoring, [>], [>], [>], [>]

  kill chain, [>]. See also cyber kill chain

  kill switch provision, [>]

  Kleiner Perkins Caufield & Byers, [>]

  Kosovo War, [>]

  Kuwait, [>]

  LabMD, [>]

  law enforcement: city police, [>]; Europol, [>]; “law enforcement sensitive” data, [>], [>]; prosecution, [>], [>]. See also Federal Bureau of Investigation

  leads, within communications metadata, [>]

  legal issues: bin Laden mission, [>]–[>]; cyber warfare with Iran, [>]; hacker used by government for illegal activities, [>]; information sharing, [>]; international laws less stringent, [>], [>], [>], [>]; lawsuit against Stratfor, [>]; liability concerns, [>], [>]; no international body/treaty in cyber warfare, [>], [>]; of NSA communication monitoring (see legal issues, monitoring by the NSA); patent rights, [>]; retaliation (see legal issues, private sector retaliation); US law for covert operations vs. international law for military operations, [>]

  legal issues, monitoring by the NSA: attacking Tor nodes, [>]; of banks, [>]; contact chaining, [>], [>], [>]; under FISA, [>], [>]–[>]; foreign/of foreigners, [>], [>]–[>], [>], [>], [>]; RTRG, [>]–[>]; of individuals vs. groups of people, [>]–[>]; tapping, [>], [>], [>]

  legal issues, private sector retaliation: by Google, [>]–[>],
[>]–[>]; government action campaign, [>]; as illegal, [>], [>]–[>], [>], [>], [>]–[>], [>], [>]; legal permission, [>], [>], [>], [>]

  legal rulings. See Foreign Intelligence Surveillance Court; US Department of Justice; US Supreme Court

  Libya, [>]

  listening posts, [>]

  Lockheed Martin, [>]–[>], [>], [>], [>], [>]–[>], [>]

  log-in. See password security

  LulzSec, [>], [>]

  Lute, Jane Holl, [>]–[>]

  MAC. See Metadata Analysis Center

  Magic Lantern software, [>], [>]–[>]

  malware: e-mail as vehicle for, [>], [>], [>]–[>], [>] (see also e-mail, posing as legitimate); identification of targets (see spear-phishing); infiltration of al-Qaeda, [>], [>]; installation strategies, [>], [>], [>]–[>], [>], [>]; kill switch to prevent, [>]; returned to hacker, [>]; reverse engineering of, [>]; used by the CIA, [>], [>]

  Mandia, Kevin, [>]

  Mandiant, [>]–[>], [>], [>], [>], [>]–[>], [>]–[>]

  Mansoor, Ahmed, [>]–[>]

  marketing of safety, [>]–[>]

  McAfee, [>], [>]

  McConnell, Mike: background, [>], [>], [>], [>], [>], [>]; cyber warfare proposal to NSC, [>]–[>], [>]; development of Cyber Command, [>]–[>]; as director of national intelligence, [>], [>]–[>]; as director of NSA, [>], [>]–[>]; national cyber defense plan, [>]–[>], [>], [>]; security briefing with Obama, [>]–[>], [>]

  McRaven, Adm. Bill, [>]–[>]

  media, [>], [>], [>]–[>]

  medical data and facilities, [>], [>], [>], [>]

  mercenaries, [>]–[>], [>]

  Metadata Analysis Center (MAC), [>]–[>]

  Mexico, [>]–[>]

  Microsoft, [>], [>], [>], [>]–[>], [>], [>], [>]

  Middle East, [>], [>], [>]–[>], [>], [>]–[>], [>]

  military: command-and-control structure, [>]–[>], [>], [>], [>], [>]; communications monitoring, [>]–[>]; cyber espionage on members, [>]; cyber recruitment and training, [>]–[>], [>]–[>], [>], [>]–[>]; rules of combat, [>]–[>], [>] n. [>]. See also warfare

  military-industrial complex, [>], [>], [>], [>], [>]

  military-Internet complex, [>]–[>], [>], [>], [>]–[>], [>], [>]

  military networks: command-and-control structure, cyber, [>]–[>], [>]; cyber breaches, [>]–[>], [>], [>], [>], [>], [>]–[>], [>], [>] n. [>]; mission to defend, [>]–[>], [>]–[>]; weapons systems, [>], [>], [>], [>]

  Miller, Charlie, [>]

  missile systems, [>]

  Monsegur, Hector Xavier, [>]–[>]

  Mubarak, Hosni, [>]

  Mueller, Robert, [>], [>]

  Mullen, Adm. Mike, [>]–[>], [>]

  Napolitano, Janet, [>], [>]

  National Aeronautics and Space Administration (NASA), [>]–[>]

  National Institute of Standards and Technology (NIST), [>], [>]–[>], [>], [>], [>]–[>]

  National Park Service, [>]

  National Reconnaissance Office, [>], [>]

  National Security Agency (NSA): alliance with private sector, [>], [>], [>], [>]–[>], [>] (see also Defense Industrial Base; Prism data collection); alliance with the FBI, [>]–[>], [>]; anti-Tor campaign, [>]–[>]; Commander’s Action Group, [>]–[>]; communications monitoring by (see National Security Agency, communications monitoring); Computer Network Operations, [>]; creation, [>], [>]–[>]; Cyber Center, [>]; data collection and management, [>], [>], [>], [>], [>], [>], [>], [>]; development of sabotage capability, [>] (see also al-Qaeda); distrust of, [>]–[>], [>], [>], [>], [>], [>], [>]–[>]; Fort Meade headquarters, [>], [>], [>], [>], [>], [>], [>], [>]; Google retaliation, [>]–[>], [>]; hunt team, [>], [>], [>], [>], [>]; insertion of vulnerabilities by, [>]–[>], [>]–[>], [>], [>], [>], [>]; leak by Snowden (see Snowden, Edward); military cyber breach, [>]–[>], [>]; National Cyber Investigative Joint Task Force, [>]; National Security Operations Center, [>]; national cyber defense plan (see National Security Agency, national cyber defense activities); natural gas system cyber breach, [>]; network forensics, [>]; 9/11 and the executive order, [>]–[>]; Office of General Counsel, [>], [>]; PDD-[>] plans, [>], [>] n. [>]; personnel deployed to war, [>]; personnel working on cyber defense, [>]; privacy issues, [>], [>], [>]–[>], [>], [>], [>], [>], [>], [>] (see also National Security Agency, distrust of); Product Line, [>]–[>]; Signals Intelligence Directorate, [>], [>], [>], [>]; Special Collection Service, [>]–[>]; Special Source Operations, [>]–[>], [>]–[>]; Starburst/Stellar program, [>]; System and Network Interdisciplinary Program, [>]; TAO unit (see Tailored Access Operations); threat signature compilation, [>], [>], [>], [>], [>], [>] (see also Defense Industrial Base); track-the-hacker programs, [>]–[>]; trainees, [>]–[>], [>]–[>], [>]; Tranche 2 plan, [>]–[>], [>]; Transgression Branch, [>]; war games, [>]–[>]; zero day exploit stockpiling, [>]–[>], [>], [>], [>], [>]–[>]

  National Security Agency (NSA), communications monitoring: Afghanistan, [>], [>]–[>]; Chinese university, [>]–[>]; code words used by, [>], [>] n. [>]; contact chaining/call chains, [>], [>], [>]–[>]; domestic, [>], [>]–[>], [>], [>], [>], [>], [>]; global, [>], [>]–[>], [>], [>]–[>], [>], [>]–[>], [>], [>]; Iraq, [>]–[>], [>]–[>], [>], [>]–[>], [>], [>], [>]–[>]; legal issues (see under legal issues); Libya, [>]; Mexico, [>]–[>]; Pakistan, [>]; Real Time Regional Gateway, [>]–[>]; Syria, [>]; tapping, [>], [>], [>], [>]; Tutelage scanning system, [>]

  National Security Agency (NSA), national cyber defense activities: bid for position of authority, [>], [>]–[>], [>]–[>], [>]–[>], [>]; early coordination, [>]–[>], [>]; loss of authority, [>], [>]–[>], [>], [>]; and Obama, [>], [>]–[>]; proposal to Bush, [>]–[>], [>], [>]

  National Security Council (NSC), [>]–[>], [>]

  NATO, [>], [>], [>], [>]

  natural gas systems, [>], [>], [>]–[>], [>]–[>], [>]

  Navy SEALs, [>], [>]

  NetWitness software, [>]

  network forensics, [>], [>]–[>], [>], [>], [>]

  Neuberger, Anne, [>]

  New York Times, [>]–[>]

  NexGen, [>]–[>]

  Next Generation Cyber Initiative, [>]

  Nieto, Enrique Peña, [>]

  9/11 attacks, [>]–[>], [>], [>], [>]

  NIST. See National Institute of Standards and Technology

  North Africa, [>]–[>], [>]

  North Korea, [>], [>], [>], [>], [>]

  Northrop Grumman, [>], [>], [>], [>]

  NSA. See National Security Agency

  NSC. See National Security Council

  nuclear facilities, [>], [>], [>], [>], [>], [>]. See also Stuxnet program

  Obama, Barack: China relations, [>], [>]–[>]; critical infrastructure executive orders, [>]–[>], [>], [>]; cyber security as a top priority, [>], [>], [>]–[>], [>]; homeland security executive order, [>]; and the Mandiant report, [>]–[>], [>]–[>]; and the NSA, [>]–[>], [>], [>]–[>]; PDD-[>] presidential directive, [>], [>] n. [>]; security briefing with McConnell, [>]–[>], [>]

  Obelisk, [>], [>]

  Office of the Director of National Intelligence, [>], [>], [>]

  operations, cyber warfare: black bag jobs, [>], [>], [>]; Buckshot Yankee, [>]–[>], [>]; Flatliquid, [>]–[>], [>] n. [>]; Freedomnet, [>]; Ironavenger, [>]; natural gas system investigation, [>]–[>], [>]; Operation Aurora (see China, cyber campaign against the US); Operation b54, [>], [>]; Operation Byzantine Foothold, [>]; Shifting Shadow, [>]–[>]; Stuxnet, [>], [>]–[>], [>], [>], [>], [>]; Tranche 2 plan, [>]–[>], [>]; Turbulence program, [>]

  Outlook e-mail, [>], [>]

  Packeteer software, [>]

  Pakistan, [>], [>], [>], [>]–[>]

  Palantir Technologies, [>], [>]

  Panetta, Leon, [>], [>], [>]–[>]

  password security: bypass of (see backdoors); capture of, [>], [>], [>], [>], [>], [>], [>], [>]; flimsy password, [>]; long/harder-to-guess password, [>]

  patent rights, [>]

  “patient zero,” [>], [>]

  PayPal, [>]

  P
DD-20, rules of combat, [>]–[>], [>] n. [>]

  pdf documents, [>]–[>]

  Pentagon, [>], [>], [>], [>], [>]–[>], [>]

  People’s Liberation Army, [>]–[>], [>], [>], [>], [>]–[>]. See also Unit 61398/APT1

  Petraeus, Gen. David, [>]–[>], [>], [>]–[>], [>]–[>], [>]

  petroleum power systems, [>]–[>], [>], [>], [>]–[>], [>], [>], [>]. See also critical infrastructures

  phones. See cell phones; telecommunications entries

  Polarbreeze, [>]

  political activists. See activists, political

  political analysis, [>], [>]

  Pretty Good Privacy program, [>]

  Prism data collection, [>], [>], [>], [>], [>]

  privacy issues: anonymity, [>], [>], [>]–[>], [>], [>]–[>], [>], [>]; cyber espionage of Americans, [>]–[>], [>]–[>], [>], [>]–[>], [>], [>]; electronic signatures, [>]; government surveillance, [>], [>]–[>], [>]; medical data, [>], [>], [>]; Supreme Court ruling, [>]; use of term, [>]. See also National Security Agency, privacy issues

  private sector: alliance with DHS, [>]–[>]; alliance with the NSA, [>], [>], [>]–[>], [>]–[>] (see also Defense Industrial Base; Prism data collection); as bait to catch hackers, [>]–[>], [>], [>]–[>]; better pay than the military, [>], [>], [>]–[>]; boutique firms, [>], [>], [>], [>]; cyber arms market, [>]–[>], [>]–[>], [>]–[>], [>]; cyber espionage against (see intellectual property); cyber security businesses, [>], [>], [>], [>], [>]–[>], [>]–[>], [>]–[>] (see also specific companies); cyber security by, [>], [>], [>]–[>], [>], [>], [>], 225–26; DOD contractors (see contractors, defense); at government classified threat briefings, [>], [>]–[>], [>], [>], [>], [>], [>]; marketing of cyber security, [>]–[>]; mercenaries, [>]–[>], [>]; military-Internet complex, [>]–[>], [>], [>], [>]–[>], [>], [>]; percent of computer networks owned by, [>]; retaliation by, [>]–[>], [>], [>]–[>]. See also legal issues, private sector retaliation

  Product Line, [>]–[>]

  propaganda, [>], [>], [>], [>], [>]–[>]

  Prophet collection “platform,” [>

‹ Prev