@War: The Rise of the Military-Internet Complex

Home > Other > @War: The Rise of the Military-Internet Complex > Page 33
@War: The Rise of the Military-Internet Complex Page 33

by Shane Harris

], [>], [>]

  public disclosure, reasons against, [>]–[>], [>], [>]–[>], [>]. See also documents/information, declassified; private sector, at government classified threat briefings

  quarantine, e-mail, [>], [>]

  Qwest Communications, [>]–[>], [>]

  random number generator, [>]–[>], [>]

  Raytheon, [>], [>], [>], [>]–[>]

  reachback, [>], [>]

  real-time data, [>], [>], [>], [>], [>]

  Real Time Regional Gateway (RTRG), [>]–[>]

  release authority, [>], [>], [>], [>], [>]

  Remote Control System, [>]–[>]

  Remote Operations Center (ROC), [>], [>]

  Rogers, Vice Adm. Michael, [>]

  Romania, [>]

  Rouland, Chris, [>]–[>], [>]

  routing systems, [>]–[>], [>], [>]

  RSA, [>]–[>], [>]

  RTRG. See Real Time Regional Gateway

  Russia, [>], [>]–[>], [>], [>], [>]–[>], [>], [>]

  Rustan, Pedro, [>]–[>]

  Saddam Hussein, [>], [>], [>]

  SAIC, [>], [>], [>]

  satellites, [>], [>], [>], [>], [>], [>]

  Saudi Arabia, [>], [>]

  Schaeffer, Richard, [>]

  Schneier, Bruce, [>]–[>]

  Schriever Wargame, [>]–[>], [>]–[>]

  Schuh, Justin, [>]

  “secret sauce.” See Alexander, Gen. Keith, bid for NSA’s authority by

  “secure sockets layer” service, [>]

  selector, within communications metadata, [>]

  servers: Citadel, takeover by Microsoft, [>]; command-and-control, [>]–[>], [>], [>], [>], [>]; destruction, [>]–[>]; as drop point, [>]–[>], [>]; of e-mail service, [>]; imposter, during military breach, [>], [>]; NSA, [>], [>]; shutdown, [>]; Tor, [>]

  Shifting Shadow program, [>]–[>]

  SIGINT. See signals intelligence

  SIGINT Enabling Project, [>], [>]

  Signals Intelligence Directorate, [>], [>], [>], [>]

  signals intelligence (SIGINT), [>], [>], [>], [>], [>]

  signature (hacker methods). See threat signature

  signature (written name), [>]

  Silk Road, [>]

  sinkholing, [>]

  SkyDrive, [>]

  Skype, [>]

  Snort, [>]

  Snowden, Edward: background, [>]–[>]; information released by, [>]–[>], [>]–[>], [>], [>], [>], [>], [>], [>]–[>], [>] n. [>]

  software: antivirus, [>]; cybersecurity, [>]; cyber targeting, [>]; data filtering, [>]; data mining, [>], [>], [>], [>], [>]–[>]; distributed computing, [>], [>]; to fend off automated probes, [>]; geo-location, [>]; malicious (see malware; spyware); network forensics, [>], [>]–[>], [>]; patches and updates for, [>]–[>], [>]–[>], [>], [>], [>], [>], [>]; and secret/illegal access (see backdoors)

  software manufacturers, [>], [>], [>]. See also specific companies

  Sourcefire, [>]–[>]

  Soviet Union. See Russia; Cold War

  spear-phishing, [>], [>], [>], [>], [>], [>], [>]. See also e-mail, posing as legitimate

  Special Operations Command, [>], [>]–[>], [>]

  spyware: camera/microphone activation by, [>], [>], [>]; by China (see China, cyber campaign against the US); installation (see spyware, vehicles for); keystroke monitoring, [>], [>], [>], [>]; sold by private companies, [>]–[>]; and spear-phishing, [>], [>], [>], [>], [>]; used by FBI, [>], [>]–[>]; used by TAO, [>]–[>]

  spyware, vehicles for: e-mail, [>], [>], [>], [>], [>]–[>]; links, [>]; software updates, [>]–[>], [>], [>]; thumb drive, [>], [>], [>]–[>]

  Stasio, Bob, [>]–[>], [>]–[>], [>], [>]–[>]

  Stellar Wind program, [>], [>]–[>]

  Stokes, Bruce, [>]–[>]

  Stratfor, [>]–[>]

  Stuxnet program, [>], [>]–[>], [>], [>], [>], [>], [>]

  surveillance technology, [>], [>], [>], [>]

  Sweden, [>]

  Syria, [>], [>], [>]–[>], [>]

  tactics: botnets, [>], [>], [>], [>]; changing nature of, [>], [>], [>]; clock skew, [>]; crashes, [>]–[>], [>]–[>], [>], [>], [>], [>]; cyber kill chain, [>]–[>]; defense, [>], [>]–[>], [>], [>]–[>], [>], [>]–[>]; denial-of-service attacks, [>], [>], [>], [>], [>]; e-mail, posing as legitimate, [>], [>], [>] (see also spear-phishing); firmware crash, [>]; fuzzing, [>]–[>]; hijacking computers/servers, [>], [>], [>], [>], [>]; keystroke monitoring, [>], [>], [>], [>]; quarantine, [>], [>]; redirection of traffic to NSA-controlled server, [>]; tagging specific computers, [>]; worms, [>], [>], [>], [>]–[>], [>] (see also Stuxnet program). See also hack-backs; viruses; zero day exploits

  Tailored Access Operations (TAO), [>]–[>], [>], [>], [>], [>]–[>], [>]–[>], [>], [>], [>]

  Taiwan, [>]

  Taliban, [>], [>]–[>]

  TAO. See Tailored Access Operations

  Target, [>], [>], [>]

  TASC, [>]–[>]

  Team Themis, [>]–[>]

  telecommunications companies, [>]–[>], [>], [>], [>]–[>], [>], [>], [>]–[>], [>]. See also specific companies

  telecommunications networks: DOD, [>]; fiber-optic trunk lines, [>], [>], [>]; Google, [>]; kill switch provision, [>]; right to spy in exchange for US license, [>]; Skype, [>]; undersea cables, [>], [>]

  Telvent, [>]–[>], [>]

  terrorism. See counterterrorism; 9/11 attacks

  threat signature, [>], [>], [>], [>], [>], [>]–[>], [>]

  thumb drives, [>], [>], [>], [>], [>]–[>], [>], [>]

  Tier [>], [>]

  tippers, within communications data, [>]

  Tiversa, [>]–[>]

  Tor, [>]–[>], [>], [>], [>]

  Tranche 2 plan, [>]–[>], [>]

  Transportation Security Administration, [>]

  transportation system. See critical infrastructures

  Truman, Harry, [>]–[>]

  Turbine, [>]–[>]

  Turbulence, [>]

  Turmoil, [>], [>]

  Tutelage, [>]

  Twitter, [>], [>], [>]

  Unit 61398/APT1, [>]–[>], [>]–[>], [>], [>]

  United Arab Emirates, [>]–[>]

  United States: China as lender to, [>]–[>]; consequences of cyber war, [>], [>], [>], [>]; drug war alliance with Mexico, [>]; international cyber agreements, [>], [>]; national cyber defense plan, [>]–[>], [>]; trade with China, [>], [>], [>], [>]

  US Air Force: aircraft, [>]–[>], [>], [>]; cyber breaches, [>]–[>], [>]–[>], [>], [>]; cyber force, [>], [>], [>]–[>], [>], [>]–[>]; Schriever Wargame, [>]–[>], [>]–[>]; 70th Intelligence, [>]; training at Keesler AFB, [>]

  US Army, [>], [>], [>]

  USB. See thumb drives

  US Chamber of Commerce, [>], [>]

  US Congress, [>], [>], [>]–[>], [>], [>]

  US Cyber Command: Alexander as chief, [>]–[>], [>], [>], [>]; development, [>]–[>], [>], [>], [>], [>]; and Endgame, [>]; leadership separate from NSA, [>], [>]; responsibilities, [>], [>], [>], [>]–[>]

  US Department of Commerce, [>], [>]

  US Department of Defense (DOD): alliance with the FBI, [>]; classified threat intelligence sharing, [>], [>], [>]–[>], [>]; cyber breach, [>], [>]–[>], [>]; cyber security by Lockheed, [>]; cyber warfare budget, [>]; invention of the Internet, [>]; joint project with NASA, [>]–[>]; mission, [>]; reduction of gateways, [>]. See also contractors, defense

  US Department of Energy, [>], [>], [>], [>]

  US Department of Homeland Security (DHS): action campaign, [>]; classified threat briefings, [>], [>]–[>], [>]; cross-sector working groups, [>]–[>]; during cyber breaches, [>], [>]–[>], [>], [>]; cyber security, lax, [>]; cyber security test of nuclear facility, [>]; deputy secretary, [>]–[>]; and the DIB, [>], [>]–[>]; gateway reduction, [>]–[>]; headquarters, [>]; list of critical infrastructures, [>], [>]; relationship with the NSA, [>], [>]–[>]; and release of the Mandiant report, [>]; responsibilities, [>]–[>], [>]–[>]; Schriever Wargame, [>]; secretaries, [>]–[>]

  US De
partment of Justice, [>], [>]–[>], [>]–[>], [>], [>]

  US Department of the Treasury, [>], [>], [>]

  US Marine Corps, [>], [>], [>], [>], [>]

  US Navy, [>], [>], [>], [>], [>], [>], [>]

  US State Department, [>], [>]–[>], [>], [>], [>]–[>], [>], [>] n. [>]

  US Strategic Command, [>]–[>], [>], [>]–[>]. See also US Cyber Command

  US Supreme Court, [>]

  utilities, [>], [>], [>], [>]. See also electrical power systems; water utilities

  Venezuela, [>]

  Verizon, [>], [>], [>]

  viruses, [>], [>], [>], [>], [>]–[>], [>], [>], [>]. See also malware; spyware

  vulnerabilities, [>]–[>], [>]–[>], [>], [>], [>], [>], [>], [>]. See also zero day exploits

  Vupen, [>]–[>]

  warfare: and critical infrastructures, [>], [>], [>]; deterrence tactics, [>]–[>]; evolution of military structure, [>]; five domains of, [>]; interrogation information, [>], [>], [>]; international law of armed conflict, [>], [>]; nuclear, [>], [>], [>]; weapons of mass destruction, [>]. See also cyber warfare; military

  war games, [>]–[>], [>]–[>]

  warrant issues, [>], [>], [>], [>], [>]

  water utilities, [>], [>]

  weapons systems, [>], [>], [>], [>]

  Weatherford, Mark, [>], [>], [>]

  Wells Fargo, [>], [>], [>]

  Wen Jiabao, [>]

  White House, [>], [>], [>], [>], [>], [>]–[>]

  WikiLeaks, [>]–[>], [>]

  The Wire (television series), [>], [>]

  World War II, [>], [>]

  worms, [>], [>], [>], [>]–[>], [>]. See also Stuxnet program

  Yahoo, [>], [>], [>], [>]

  YouTube, [>]

  Yugoslavia, [>]

  zero, patient, [>], [>]

  zero day exploits: against Adobe, [>]; each can only be used once, [>]; and Endgame, [>], [>], [>]; installed by China, [>]; produced by the NSA, [>]–[>]; sale of, [>], [>]; stockpiled by banks, [>]; stockpiled by the NSA, [>], [>]–[>], [>], [>], [>], [>]–[>]

  About the Author

  SHANE HARRIS is the author of The Watchers: The Rise of America’s Surveillance State, which won the New York Public Library’s Helen Bernstein Book Award for Excellence in Journalism and was named one of the best books of 2010 by the Economist. Harris won the 2010 Gerald R. Ford Prize for Distinguished Reporting on National Defense. He is currently senior writer at Foreign Policy magazine and an ASU fellow at New America, where he researches the future of war. Previously, he was senior writer at the Washingtonian, and his work has appeared in the New York Times, the Wall Street Journal, Slate, the Daily Beast, the Washington Post, and numerous other publications. He has provided analysis and commentary for CNN, NPR, the BBC, and many other media organizations and radio stations.

 

 

 


‹ Prev