by Shane Harris
drives, USB. See thumb drives
drone technology, [>], [>], [>], [>], [>], [>], [>]
Eastern Europe, [>], [>], [>], [>], [>]
eBay, [>]
Egypt, [>]
Eisenhower, Dwight, [>], [>], [>]
electrical power systems, [>], [>], [>]–[>], [>], [>], [>], [>], [>] n. [>]. See also critical infrastructures
Electronic Privacy Information Center, [>]
e-mail: BlackBerry, [>]; cyber breaches, [>], [>], [>], [>]; FBI sting, [>]–[>]; of foreigners vs. Americans, [>]–[>], [>]; Gmail, [>], [>], [>], [>]; Hotmail, [>]; and the Iraq War, [>], [>], [>], [>], [>], [>]; monitoring, [>], [>], [>], [>], [>]–[>], [>], [>], [>]–[>]; Outlook, [>], [>], [>]; posing as legitimate, [>], [>], [>], [>] (see also malware, e-mail as vehicle for; spear-phishing; spyware, vehicles for); security, [>], [>], [>], [>]–[>], [>], [>]; strategies for anonymity, [>], [>], [>]
embassies, [>], [>], [>]–[>]
encryption, [>], [>], [>]–[>], [>], [>], [>], [>], [>], [>]
encryption key, [>], [>]
Endgame, [>], [>]–[>], [>], [>]
energy resources. See electrical power systems; nuclear facilities; petroleum power systems
engineering, reverse, [>]
England, Gordon, [>]
Estonia, [>]
ethical issues: cyber offense by private companies, [>]; how sold information is used, [>], [>]; placement of blame for zero day attack, [>]; responsibility to disclose vulnerabilities, [>], [>]–[>], [>]–[>], [>]
Facebook, [>], [>], [>], [>], [>]
Federal Bureau of Investigation (FBI), [>], [>]–[>], [>], [>]–[>], [>], [>]–[>], [>]–[>], [>], [>]
fiber-optic trunk lines, [>], [>], [>]
Fick, Nathaniel, [>]–[>]
fifth domain, cyberspace as the, [>], [>], [>], [>], [>]
file-sharing networks, [>]–[>]
financial and banking data systems: clearinghouse network, [>]; cyber breaches, [>]–[>], [>]–[>]; cyber security, [>], [>], [>]–[>], [>]–[>], [>], [>]; denial-of-service attacks, [>], [>], [>], [>], [>]; hack-back against Citadel, [>]–[>]; risks of malware use in military context, [>]–[>], [>]. See also critical infrastructures
FinFisher software, [>]–[>], [>]
FireEye, [>], [>]
Firefox, [>]
First Amendment, [>]
FISA. See Foreign Intelligence Surveillance Act
Flatliquid operation, [>]–[>], [>] n. [>]
Foreign Intelligence Surveillance Act (FISA), [>], [>]–[>], [>]
Foreign Intelligence Surveillance Court, [>], [>]–[>], [>]
foreign policy, US: for China, [>]–[>], [>]–[>]; international cyber agreements, [>], [>]; and monitoring of foreigners, [>], [>]–[>], [>], [>], [>], [>]
forensics, network, [>], [>]–[>], [>], [>], [>]
Fourth Amendment, [>], [>], [>], [>], [>]
France, [>]–[>], [>]–[>], [>]
F-35. See Joint Strike Fighter
future innovations in cyber security, [>]–[>]
future scenario for cyberspace, [>]–[>]
fuzzing, [>]–[>]
Gates, Robert, [>], [>], [>], [>]–[>], [>], [>], [>], [>], [>]
gateways, [>], [>]
Google: alliance with NSA, [>], [>], [>], [>], [>]–[>], [>]; China market, [>]; cyber security, [>]–[>], [>], [>], [>]; distributed computing, [>]; Gmail, [>], [>], [>], [>]; NSA’s secret monitoring of, [>], [>]; retaliation against China, [>]–[>], [>], [>] n. [>]; telecommunications networks, [>]; user statistics, [>]
gray market, [>], [>], [>], [>], [>]
hack-backs, [>], [>], [>], [>]–[>], [>], [>]
hackers: anonymity, [>], [>], [>], [>], [>]; catching (see hackers, catching); conferences, [>], [>], [>], [>]; freelance, [>], [>]–[>]; groups (see Anonymous; LulzSec); hacktivists, [>], [>]; mercenaries, [>]–[>], [>]; within the NSA (see Tailored Access Operations); as pirates/privateers, [>]; retaliation against (see hack-backs; private sector, retaliation by); trained for US cyber warfare, [>]–[>], [>], [>], [>], [>]–[>], [>], [>], [>]; “white hat” and “black hat,” [>], [>]
hackers, catching: bounty system, [>]; FBI activities, [>]–[>]; honeypots, [>], [>], [>], [>]; imposter server, [>]; network forensics, [>], [>]–[>], [>], [>], [>]; private companies as bait, [>]–[>], [>], [>]–[>]
Hacking Team, [>]–[>]
Hammond, Jeremy, [>]–[>], [>]
Harris Corporation, [>]
Hayden, Lt. Gen. Michael, [>]–[>], [>], [>]
honeypot, [>], [>], [>], [>]
Hu, Jintao, [>]
Huawei, [>]
Hunton Williams, [>]. See also Team Themis
Hutchins, Eric, [>], [>]–[>]
IBM, [>], [>], [>]
iDefense, [>]
India, [>]
informants, [>], [>]–[>], [>], [>]
Information Operations Center (IOC), [>]
Information Operations Command, [>]
In-Q-Tel, [>], [>]
intellectual property, cyber theft: by China, [>], [>]–[>], [>], [>]–[>], [>], [>]–[>], [>], [>], [>] n. [>] (see also private sector, retaliation); of Google, [>]–[>], [>] n. [>]; of Target, [>], [>]
Internet: anonymity, [>], [>], [>], [>], [>]; anticensorship projects, [>], [>]; as a battlefield, [>]–[>], [>]; domain issues, [>], [>]; gateways, [>], [>]; illegal activities (see cybercrime); inherent vulnerability in access to, [>], [>], [>]; invention, [>]; military-Internet complex, [>]–[>], [>], [>], [>]–[>], [>], [>]
Internet browsers, [>]
Internet cafes, [>]–[>], [>]
Internet protocol addresses: compilation (see Defense Industrial Base; Prism data collection); hiding (see Internet, anonymity); private companies that provide (see mercenaries); security, [>], [>], [>], [>]
Internet Security Systems, [>]
Internet service providers: during bank cyber breach, [>], [>]; CIA installation of spyware, [>]; concerns working with US government, [>], [>], [>]–[>]; and the NSA, [>]–[>], [>]–[>], [>], [>], [>], [>], [>]; as Tier [>], [>]
IOC. See Information Operations Center
Iran, [>], [>], [>], [>], [>]–[>]. See also Stuxnet program
Iraq, [>], [>], [>]–[>], [>], [>], [>], [>], [>], [>]–[>], [>]
Ironavenger operation, [>]
Israel, [>], [>]
Italy, [>]–[>]
Izz ad-Din al-Qassam Brigades, [>], [>]
Johnson & Johnson, [>]
Joint Chiefs of Staff, [>], [>]–[>], [>]
Joint Special Operations Command (JSOC), [>], [>], [>]–[>], [>]
Joint Strike Fighter (F-35), [>]–[>], [>], [>], [>]
keystroke monitoring, [>], [>], [>], [>]
kill chain, [>]. See also cyber kill chain
kill switch provision, [>]
Kleiner Perkins Caufield & Byers, [>]
Kosovo War, [>]
Kuwait, [>]
LabMD, [>]
law enforcement: city police, [>]; Europol, [>]; “law enforcement sensitive” data, [>], [>]; prosecution, [>], [>]. See also Federal Bureau of Investigation
leads, within communications metadata, [>]
legal issues: bin Laden mission, [>]–[>]; cyber warfare with Iran, [>]; hacker used by government for illegal activities, [>]; information sharing, [>]; international laws less stringent, [>], [>], [>], [>]; lawsuit against Stratfor, [>]; liability concerns, [>], [>]; no international body/treaty in cyber warfare, [>], [>]; of NSA communication monitoring (see legal issues, monitoring by the NSA); patent rights, [>]; retaliation (see legal issues, private sector retaliation); US law for covert operations vs. international law for military operations, [>]
legal issues, monitoring by the NSA: attacking Tor nodes, [>]; of banks, [>]; contact chaining, [>], [>], [>]; under FISA, [>], [>]–[>]; foreign/of foreigners, [>], [>]–[>], [>], [>], [>]; RTRG, [>]–[>]; of individuals vs. groups of people, [>]–[>]; tapping, [>], [>], [>]
legal issues, private sector retaliation: by Google, [>]–[>],
[>]–[>]; government action campaign, [>]; as illegal, [>], [>]–[>], [>], [>], [>]–[>], [>], [>]; legal permission, [>], [>], [>], [>]
legal rulings. See Foreign Intelligence Surveillance Court; US Department of Justice; US Supreme Court
Libya, [>]
listening posts, [>]
Lockheed Martin, [>]–[>], [>], [>], [>], [>]–[>], [>]
log-in. See password security
LulzSec, [>], [>]
Lute, Jane Holl, [>]–[>]
MAC. See Metadata Analysis Center
Magic Lantern software, [>], [>]–[>]
malware: e-mail as vehicle for, [>], [>], [>]–[>], [>] (see also e-mail, posing as legitimate); identification of targets (see spear-phishing); infiltration of al-Qaeda, [>], [>]; installation strategies, [>], [>], [>]–[>], [>], [>]; kill switch to prevent, [>]; returned to hacker, [>]; reverse engineering of, [>]; used by the CIA, [>], [>]
Mandia, Kevin, [>]
Mandiant, [>]–[>], [>], [>], [>], [>]–[>], [>]–[>]
Mansoor, Ahmed, [>]–[>]
marketing of safety, [>]–[>]
McAfee, [>], [>]
McConnell, Mike: background, [>], [>], [>], [>], [>], [>]; cyber warfare proposal to NSC, [>]–[>], [>]; development of Cyber Command, [>]–[>]; as director of national intelligence, [>], [>]–[>]; as director of NSA, [>], [>]–[>]; national cyber defense plan, [>]–[>], [>], [>]; security briefing with Obama, [>]–[>], [>]
McRaven, Adm. Bill, [>]–[>]
media, [>], [>], [>]–[>]
medical data and facilities, [>], [>], [>], [>]
mercenaries, [>]–[>], [>]
Metadata Analysis Center (MAC), [>]–[>]
Mexico, [>]–[>]
Microsoft, [>], [>], [>], [>]–[>], [>], [>], [>]
Middle East, [>], [>], [>]–[>], [>], [>]–[>], [>]
military: command-and-control structure, [>]–[>], [>], [>], [>], [>]; communications monitoring, [>]–[>]; cyber espionage on members, [>]; cyber recruitment and training, [>]–[>], [>]–[>], [>], [>]–[>]; rules of combat, [>]–[>], [>] n. [>]. See also warfare
military-industrial complex, [>], [>], [>], [>], [>]
military-Internet complex, [>]–[>], [>], [>], [>]–[>], [>], [>]
military networks: command-and-control structure, cyber, [>]–[>], [>]; cyber breaches, [>]–[>], [>], [>], [>], [>], [>]–[>], [>], [>] n. [>]; mission to defend, [>]–[>], [>]–[>]; weapons systems, [>], [>], [>], [>]
Miller, Charlie, [>]
missile systems, [>]
Monsegur, Hector Xavier, [>]–[>]
Mubarak, Hosni, [>]
Mueller, Robert, [>], [>]
Mullen, Adm. Mike, [>]–[>], [>]
Napolitano, Janet, [>], [>]
National Aeronautics and Space Administration (NASA), [>]–[>]
National Institute of Standards and Technology (NIST), [>], [>]–[>], [>], [>], [>]–[>]
National Park Service, [>]
National Reconnaissance Office, [>], [>]
National Security Agency (NSA): alliance with private sector, [>], [>], [>], [>]–[>], [>] (see also Defense Industrial Base; Prism data collection); alliance with the FBI, [>]–[>], [>]; anti-Tor campaign, [>]–[>]; Commander’s Action Group, [>]–[>]; communications monitoring by (see National Security Agency, communications monitoring); Computer Network Operations, [>]; creation, [>], [>]–[>]; Cyber Center, [>]; data collection and management, [>], [>], [>], [>], [>], [>], [>], [>]; development of sabotage capability, [>] (see also al-Qaeda); distrust of, [>]–[>], [>], [>], [>], [>], [>], [>]–[>]; Fort Meade headquarters, [>], [>], [>], [>], [>], [>], [>], [>]; Google retaliation, [>]–[>], [>]; hunt team, [>], [>], [>], [>], [>]; insertion of vulnerabilities by, [>]–[>], [>]–[>], [>], [>], [>], [>]; leak by Snowden (see Snowden, Edward); military cyber breach, [>]–[>], [>]; National Cyber Investigative Joint Task Force, [>]; National Security Operations Center, [>]; national cyber defense plan (see National Security Agency, national cyber defense activities); natural gas system cyber breach, [>]; network forensics, [>]; 9/11 and the executive order, [>]–[>]; Office of General Counsel, [>], [>]; PDD-[>] plans, [>], [>] n. [>]; personnel deployed to war, [>]; personnel working on cyber defense, [>]; privacy issues, [>], [>], [>]–[>], [>], [>], [>], [>], [>], [>] (see also National Security Agency, distrust of); Product Line, [>]–[>]; Signals Intelligence Directorate, [>], [>], [>], [>]; Special Collection Service, [>]–[>]; Special Source Operations, [>]–[>], [>]–[>]; Starburst/Stellar program, [>]; System and Network Interdisciplinary Program, [>]; TAO unit (see Tailored Access Operations); threat signature compilation, [>], [>], [>], [>], [>], [>] (see also Defense Industrial Base); track-the-hacker programs, [>]–[>]; trainees, [>]–[>], [>]–[>], [>]; Tranche 2 plan, [>]–[>], [>]; Transgression Branch, [>]; war games, [>]–[>]; zero day exploit stockpiling, [>]–[>], [>], [>], [>], [>]–[>]
National Security Agency (NSA), communications monitoring: Afghanistan, [>], [>]–[>]; Chinese university, [>]–[>]; code words used by, [>], [>] n. [>]; contact chaining/call chains, [>], [>], [>]–[>]; domestic, [>], [>]–[>], [>], [>], [>], [>], [>]; global, [>], [>]–[>], [>], [>]–[>], [>], [>]–[>], [>], [>]; Iraq, [>]–[>], [>]–[>], [>], [>]–[>], [>], [>], [>]–[>]; legal issues (see under legal issues); Libya, [>]; Mexico, [>]–[>]; Pakistan, [>]; Real Time Regional Gateway, [>]–[>]; Syria, [>]; tapping, [>], [>], [>], [>]; Tutelage scanning system, [>]
National Security Agency (NSA), national cyber defense activities: bid for position of authority, [>], [>]–[>], [>]–[>], [>]–[>], [>]; early coordination, [>]–[>], [>]; loss of authority, [>], [>]–[>], [>], [>]; and Obama, [>], [>]–[>]; proposal to Bush, [>]–[>], [>], [>]
National Security Council (NSC), [>]–[>], [>]
NATO, [>], [>], [>], [>]
natural gas systems, [>], [>], [>]–[>], [>]–[>], [>]
Navy SEALs, [>], [>]
NetWitness software, [>]
network forensics, [>], [>]–[>], [>], [>], [>]
Neuberger, Anne, [>]
New York Times, [>]–[>]
NexGen, [>]–[>]
Next Generation Cyber Initiative, [>]
Nieto, Enrique Peña, [>]
9/11 attacks, [>]–[>], [>], [>], [>]
NIST. See National Institute of Standards and Technology
North Africa, [>]–[>], [>]
North Korea, [>], [>], [>], [>], [>]
Northrop Grumman, [>], [>], [>], [>]
NSA. See National Security Agency
NSC. See National Security Council
nuclear facilities, [>], [>], [>], [>], [>], [>]. See also Stuxnet program
Obama, Barack: China relations, [>], [>]–[>]; critical infrastructure executive orders, [>]–[>], [>], [>]; cyber security as a top priority, [>], [>], [>]–[>], [>]; homeland security executive order, [>]; and the Mandiant report, [>]–[>], [>]–[>]; and the NSA, [>]–[>], [>], [>]–[>]; PDD-[>] presidential directive, [>], [>] n. [>]; security briefing with McConnell, [>]–[>], [>]
Obelisk, [>], [>]
Office of the Director of National Intelligence, [>], [>], [>]
operations, cyber warfare: black bag jobs, [>], [>], [>]; Buckshot Yankee, [>]–[>], [>]; Flatliquid, [>]–[>], [>] n. [>]; Freedomnet, [>]; Ironavenger, [>]; natural gas system investigation, [>]–[>], [>]; Operation Aurora (see China, cyber campaign against the US); Operation b54, [>], [>]; Operation Byzantine Foothold, [>]; Shifting Shadow, [>]–[>]; Stuxnet, [>], [>]–[>], [>], [>], [>], [>]; Tranche 2 plan, [>]–[>], [>]; Turbulence program, [>]
Outlook e-mail, [>], [>]
Packeteer software, [>]
Pakistan, [>], [>], [>], [>]–[>]
Palantir Technologies, [>], [>]
Panetta, Leon, [>], [>], [>]–[>]
password security: bypass of (see backdoors); capture of, [>], [>], [>], [>], [>], [>], [>], [>]; flimsy password, [>]; long/harder-to-guess password, [>]
patent rights, [>]
“patient zero,” [>], [>]
PayPal, [>]
P
DD-20, rules of combat, [>]–[>], [>] n. [>]
pdf documents, [>]–[>]
Pentagon, [>], [>], [>], [>], [>]–[>], [>]
People’s Liberation Army, [>]–[>], [>], [>], [>], [>]–[>]. See also Unit 61398/APT1
Petraeus, Gen. David, [>]–[>], [>], [>]–[>], [>]–[>], [>]
petroleum power systems, [>]–[>], [>], [>], [>]–[>], [>], [>], [>]. See also critical infrastructures
phones. See cell phones; telecommunications entries
Polarbreeze, [>]
political activists. See activists, political
political analysis, [>], [>]
Pretty Good Privacy program, [>]
Prism data collection, [>], [>], [>], [>], [>]
privacy issues: anonymity, [>], [>], [>]–[>], [>], [>]–[>], [>], [>]; cyber espionage of Americans, [>]–[>], [>]–[>], [>], [>]–[>], [>], [>]; electronic signatures, [>]; government surveillance, [>], [>]–[>], [>]; medical data, [>], [>], [>]; Supreme Court ruling, [>]; use of term, [>]. See also National Security Agency, privacy issues
private sector: alliance with DHS, [>]–[>]; alliance with the NSA, [>], [>], [>]–[>], [>]–[>] (see also Defense Industrial Base; Prism data collection); as bait to catch hackers, [>]–[>], [>], [>]–[>]; better pay than the military, [>], [>], [>]–[>]; boutique firms, [>], [>], [>], [>]; cyber arms market, [>]–[>], [>]–[>], [>]–[>], [>]; cyber espionage against (see intellectual property); cyber security businesses, [>], [>], [>], [>], [>]–[>], [>]–[>], [>]–[>] (see also specific companies); cyber security by, [>], [>], [>]–[>], [>], [>], [>], 225–26; DOD contractors (see contractors, defense); at government classified threat briefings, [>], [>]–[>], [>], [>], [>], [>], [>]; marketing of cyber security, [>]–[>]; mercenaries, [>]–[>], [>]; military-Internet complex, [>]–[>], [>], [>], [>]–[>], [>], [>]; percent of computer networks owned by, [>]; retaliation by, [>]–[>], [>], [>]–[>]. See also legal issues, private sector retaliation
Product Line, [>]–[>]
propaganda, [>], [>], [>], [>], [>]–[>]
Prophet collection “platform,” [>