Dark Territory

Home > Other > Dark Territory > Page 33
Dark Territory Page 33

by Fred Kaplan


  “How do we increase”: Ellen Nakashima, “Cyber Chief: Efforts to Deter Attacks Against the US Are Not Working,” Washington Post, March 19, 2015.

  “probably one or two”: Patricia Zengerle, “NSA Chief Warns Chinese Cyber Attack Could Shut U.S. Infrastructure,” Reuters, Nov. 21, 2014, http://www.reuters.com/article/2014/11/21/usa-security-nsa-idUSL2N0TB0IX20141121.

  “The American public”: Liberty and Security in a Changing World: President’s Review Group, 62.

  INDEX

  A note about the index: The pages referenced in this index refer to the page numbers in the print edition. Clicking on a page number will take you to the ebook location that corresponds to the beginning of that page in the print edition. For a comprehensive list of locations of any word or phrase, use your reading system’s search function.

  Abizaid, John, 159, 173

  cyber warfare as priority of, 145–48, 149–50

  Abkhazia, 164–65

  Abraham Lincoln, USS, 147

  Absolute Weapon, The (Brodie), 277

  Adelson, Sheldon, 265–66, 267

  Afghanistan, 147, 182, 199, 229

  U.S. war in, 208

  Against All Enemies (Clarke), 240

  agent.btz (computer worm), 182

  Air Combat Command, Information Warfare Branch of, 107, 110

  Air Force, U.S., 64, 70, 79

  Office of Special Investigations of, 85, 87

  Air Force Cryptology Support Center, 62

  Air Force Information Operations Center, 225

  Air Force Information Warfare Center (Air Intelligence Agency), 7, 32, 58–59, 85, 107, 108, 110, 111, 112, 122–23, 126, 137, 161, 176, 212, 223, 225, 292n–93n, 296n

  Computer Emergency Response Team of, 62–63, 69, 73

  demon-dialing counter-C2 plan of, 59, 64

  Network Security Monitoring program of, 60–61, 62

  Air Force Scientific Advisory Board, 51

  Air Force Systems Command, 50

  Alexander, Keith, 148–49, 173, 213

  as Army deputy chief of staff for intelligence, 149–50

  as Army Intelligence and Security commander, 148, 152, 154–55, 196

  BuckShot Yankee and, 182–84

  CNE and, 180

  as CyberCom head, 189, 211

  cyber warfare expertise of, 149, 157–58

  Hayden’s conflicts with, 152–53, 154–55

  infrastructure security and, 280–82

  metadata and, 230, 231, 233, 253, 256

  as NSA director, 152, 155–56, 174, 178–81, 182–84, 185–86, 187, 189, 204, 211, 214, 231, 244, 247, 252, 253, 256

  Obama information-sharing bill opposed by, 281–82

  PRISM and, 247

  and Snowden leaks, 231

  Stuxnet attack and, 204–5, 206

  Turbulence and, 157–58

  al Qaeda, 140, 142–43, 147, 151, 171, 192, 197, 240–41, 245

  U.S. drone strikes on, 201, 208

  Amazon, 102

  American Civil Liberties Union (ACLU), 239

  American Electrical Power Company, 167

  Anderson, Jack, 288n–89n

  Andrews, Duane, 54

  Andrews Air Force Base, cyber attack on, 73, 74

  AntiOnline, 77

  AOL, PRISM and, 247

  Apple, PRISM and, 247

  Aristide, Jean-Bertrand, 58, 59

  Army, U.S., 70, 79, 151

  Intelligence and Security Command of, 148, 152–55, 196

  Land Information Warfare Activity of, 32, 123

  Army Intelligence Center, 148–49

  ARPANET, 7–9, 276

  Arquilla, John, 291n

  ASD(C3I), 6, 20, 54, 119, 125

  Asia Society, Donilon’s speech at, 221–22, 226–27

  Assad, Bashar al-, 160–61, 198

  Assante, Michael, 166–67

  @stake, 103

  Aurora Generator Test, 166–69, 171, 174, 204, 206, 241

  Australia, see five eyes

  auto industry, 199

  automobiles, hacking of computers in, 273n–74n

  back doors, 8, 37, 73, 93, 235, 257

  Baghdad, 22

  Balad Air Base, Iraq, 159

  Balkans, 1999 NATO bombing of, 112–14, 115, 119, 161

  banking industry:

  cyber attacks and, 104, 275

  cyber security as low priority of, 175

  2008 crisis in, 199

  Basra, 22

  Bates, John, 250

  Baywatch (TV show), 112

  beacons (cyber tracking code), 83, 181–82, 207

  Beers, Rand, 46, 48, 49, 89, 95, 97

  Bejtlich, Richard, 137, 223

  Bell Corporation, 44

  Bellknap, Lloyd, 62

  Berger, Sandy, 89, 96

  bin Laden, Osama, 89, 90, 140, 142–43

  killing of, 239

  Black, William, 132, 156, 219

  Black Chamber, 11

  Bloomberg Businessweek, 268

  BND, 235

  BNN, 95

  Boeing, 132

  Booz Allen Hamilton, 132, 172, 173, 176

  Border Gateway Protocol, 93

  Bosnia-Herzegovina, 110–11, 146

  Bremer, L. Paul, 147

  Brezhnev, Leonid, 12

  Broderick, Matthew, 1, 59

  Brodie, Bernard, 277, 278

  Brooks, Jack, 20, 34

  Brown, Michael, 187–88

  Bryan, James D., 122, 147

  Buckshot Yankee, 185, 207, 276

  Alexander and, 182–84

  Bush, George H. W., 21, 24, 44, 66

  Bush, George W., 3, 103, 171, 173, 175–76, 216, 225, 304n–5n

  FISA revision and, 193, 195

  Iraq insurgency and, 150

  Iraq invasion and, 142–43, 145, 147

  Iraq troop surge ordered by, 158, 173

  McConnell’s cyber warfare briefing of, 173–75, 187

  NSPD-54 of, 178, 199

  Obama’s Stuxnet briefing by, 203

  Stellar Wind and, 155n

  Stuxnet and, 203, 205, 206, 208, 209, 212, 215

  in 2000 election, 103, 139–40

  Bush (G.W.) administration:

  cyber security as viewed in, 140–41

  cyber warfare and, 3

  terrorism as low priority of, 140–41

  warnings on al Qaeda ignored by, 240–41

  Butler, Robert, 279

  Campbell, John “Soup,” 70–71, 110–11, 121, 122

  JTF-CND headed by, 81–82, 83–84, 88

  Canada, see five eyes

  Cannon, Lou, 287n–88n

  Carter, Ashton, 283

  Carter, Jimmy, 13, 15, 59

  Cartwright, James, 219

  Casablanca (film), 234–35

  Casey, William, 27

  Central Command, U.S., 145–46, 147–48, 149, 152, 207,

  cyber attack on, 181–84, 185

  Central Intelligence Agency (CIA), 6, 27, 45, 49, 126, 146, 147, 151, 185, 229, 238–39

  civil liberties abuses by, 192

  Critical Defense Technologies Division of, 7

  Hayden as director of, 215

  Information Operations Center of, 113, 134, 161, 207

  NSA interaction with, 133–34

  Cerf, Vint, 102, 103

  Charney, Howard, 235

  Cheney, Dick, 24, 140, 174, 203–4

  Chilton, Kevin, 183

  China:

  information warfare and, 224

  U.S. hacking of computer systems in, 227–28, 229

  U.S. relations with, 221–28

  China, cyber warfare by, 4, 85n, 198, 213, 220, 221–28, 242, 269

  financial theft in, 224, 227

  Google attack of, 234

  intellectual property and trade secrets as targets of, 224–27, 308n

  Obama and, 221–28, 235

  see also People’s Liberation Army

  Christopher, Warren, 12–13

  Church, Frank, 37, 192, 285

&nb
sp; Church Committee, 37, 230, 252

  “CIA Eavesdrops on Kremlin Chiefs” (Anderson), 288n–89n

  Cisco, 137, 235

  Citibank, Russian hackers’ attack on, 42

  civil liberties:

  intelligence community and, 251–52, 259, 260

  NSA and, 3, 20, 188, 192, 194–96, 231, 239, 244–52, 264

  Protect America Act and, 194–95

  Stone and, 239, 244, 251, 259, 264

  Civil War, U.S., 4

  Clapper, James, 231–33

  Clark, Wesley, 112, 113, 115

  Clarke, Richard, 139, 174, 175–76, 177, 191n, 200, 225, 274

  books written by, 240–42

  in Bush (G.W.) administration, 140–41, 143

  as Clinton’s counterterrorism adviser, 89, 95–97

  critical-infrastructure plan of, 239–40

  FBI briefing and, 254–55

  Hamre and, 95–96

  L0pht and, 91–4

  National Plan for Information Systems Protection written by, 100–105, 141–42

  9/11 attacks and, 141

  9/11 Commission testimony of, 240

  PDD-63 as drafted by, 97–99

  presumptuousness of, 95–96, 98, 101, 240

  in Review Group, 240, 243, 245, 247, 251, 253, 254–55

  Zatko and, 90–95, 103–4

  Clinton, Bill, 3, 40, 55, 74, 87, 89, 96, 102, 115, 175–76, 239

  cyber security summit of, 102–4

  Executive Order 13010 of, 47, 48–49, 74

  Haitian invasion planned by, 58–59, 107–8

  Lewinsky affair and, 103, 115

  PDD-39 of, 39–40

  PDD-63 of, 95

  Clipper Chip, 36–37, 40, 58, 100, 128, 239, 244

  CNCI, see Comprehensive National Cybersecurity Initiative (CNCI)

  Coalition Vulnerability Assessment Team, 65–66

  Cohen, William, 113, 120, 121

  Cold War, 4, 84, 129, 184, 284

  cryptology in, 13

  end of, 29, 30, 123, 124

  espionage in, 138–39

  NSA and, 12

  nuclear options in, 218

  unspoken rules in, 272–73

  command-control systems, 13, 15, 43, 51, 65, 224

  Commerce Department, U.S., 34

  cyber security as viewed in, 172–73

  Comprehensive National Cybersecurity Initiative (CNCI), 177–78, 180, 198–99, 278

  Computer Crime Initiative Plan, 41–42

  computer industry:

  cyber security as low priority of, 102–3, 104–5, 176

  PDD-63 resisted by, 98, 99–100

  Snowden leaks and, 234

  Computer Network Attack (CNA), 122, 137–38, 180, 204, 211, 212, 219, 220, 281, 283

  Computer Network Defense (CND), 122, 137–38, 180

  Computer Network Exploitation (CNE), 137–38, 180, 204, 212, 281

  computer networks, 33

  back doors in, 8, 73

  IDS devices in, 176

  infrastructure and, 41, 45, 52–53

  inherent vulnerability of, 172, 174, 176–77, 179, 206–7, 241, 276–77

  see also Internet

  computers, computer software:

  omnipresence of, 5

  race between hackers and patchers in, 136–37

  security of, see cyber security

  zero-day vulnerabilities in, 137

  Computers at Risk (National Research Council), 54

  Computer Sciences Corp., 132

  Computer Security Act (1987), 34

  Computer Security Center (NSA), 18–19, 34, 60

  Congress, U.S., 192

  CNCI and, 178–79

  defense authorization bills of, 46–47

  NSA and, 3, 20, 27, 195–96

  select intelligence committees of, 256

  Congressional Budget Office, 71

  Constitution, U.S., Fourth Amendment of, 192, 250

  Cornerstones of Information Warfare (Weaver), 108

  corporations:

  cyber security as low priority of, 102–3, 104–5, 176, 274

  regulations feared by, 98–99, 101, 176, 200, 274–75

  as reluctant to share information, 281–82

  Cotter, George, 18–19

  counter command-control (counter-C2) warfare, 15–16, 33, 41, 58, 59, 76, 84, 220

  in Desert Storm, 21–25

  counterinsurgency strategies, 148, 158–59, 160

  Critical Foundations (Marsh Report), 53–55, 72, 80, 89, 94, 100, 139, 142, 166, 199, 241

  “Critical Infrastructure Protection” (PDD-63), 95, 139

  Clarke’s draft of, 97–99

  computer industry objections to, 98, 99–100

  see also National Plan for Information Systems Protection

  Critical Infrastructure Working Group, 40–41, 42–43, 48, 51

  report of, 46, 47–48, 50

  Cryptolog, 219–20

  cryptology, 5, 7, 11, 13, 18

  Cuckoo’s Egg, The (Stoll), 61, 82–83

  “cyber,” first use of term, 45–46

  cyber attacks, cyber warfare, 4–6, 53

  Abizaid’s prioritizing of, 145–48, 149–50

  as acts of war, 214, 271, 317n

  Alexander’s expertise in, 149, 157–58

  banking industry and, 104, 275

  Bush (G.W.) administration and, 3

  on Central Command, 181–84, 185

  by China, see China, cyber warfare by

  denial-of-service, 102–3, 162–63, 213, 216

  distinction between national security and property theft in, 227

  Eligible Receiver in, see Eligible Receiver 97 cyber attack exercise

  escalation of, 213–20, 273–74, 284

  on Estonia, 162–64, 165, 241

  Gates’s concern about, 272–73

  on Georgia, 164–66, 241

  infrastructure as targets of, 104

  and inherent vulnerability of networks, 276–77

  Iran and, 4, 213, 265–68

  against Iraq insurgents, 158–60, 173, 180

  on Las Vegas Sands Corporation, 265–68

  Law of Armed Conflict and, 25

  Moonlight Maze and, 78–79, 81–88, 98, 119, 123, 187, 212–13, 223, 241, 276

  morality of, 215

  by North Korea, 4, 213, 216, 268–71, 272n

  nuclear weapons vs., 215–16, 218

  Obama administration and, 3–4

  physical damage from, 166–69, 174, 198, 214, 215

  political influence as goal of, 267

  race between hackers and patchers in, 136–37

  Reagan administration and, 1–3, 6–7

  risks of, 212–13

  by Russia, 4, 42, 164–66, 224

  secrecy of, 212, 214–15, 216, 219, 284–85

  Solar Sunrise and, 74–78, 80, 81, 98, 101, 119, 120, 123, 183, 187, 241

  strategic role of, 168, 215

  terrorists and, 98

  unintended consequences of, 217

  U.S. military’s resistance to, 117–18, 119, 120

  U.S. offensive operations in, 4, 48–49, 174, 211–12, 291n

  zero-day vulnerabilities and, 137

  see also hacking, hackers; information warfare; specific operations and attacks

  Cyber Command, U.S., 4, 211, 279–80

  Alexander as head of, 189, 211

  combatant support mission of, 280, 283

  consolidation of armed services cyber agencies under, 195

  critical-infrastructure security mission of, 280–83

  Defense Department network security mission of, 280, 283

  fusion of NSA and, 243, 260

  McConnell’s proposal for, 185

  Review Group recommendations for, 257

  Rogers as head of, 282

  Cyber Council, 176

  cyber crime, 41–42, 46

  CNE and, 139

  cyber deterrence, 283

  asymetrical response in, 277–78

  Defen
se Science Board and, 278–79

  McConnell and, 278

  nuclear deterrence vs., 284–85

  cyber-offensive teams, 211–12

  Cyber Operations Policy Working Group, 217

  cyber security, 17, 186, 243, 257

  active defense (offensive operations) in, 281, 282, 283

  air gaps in, 206–7

  ARPANET and, 8–9

  back doors and, 8, 37, 73

  banking industry’s low priority for, 175

  Bush (G.W.) administration complacency about, 140–41

  Clinton’s summit on, 102–4

  CNE and, 139

  computer industry’s low priority for, 102–3, 104–5, 176

  computer networks and, 33

  Defense Science Board report on, 275–79

  detection as goal of, 277

  exponential rise in breaches of, 273–74

  information-sharing and, 281–82

  infrastructure and, 186–89

  Internet and, 52–53

  McConnell’s briefing of Bush on, 174–75

  McConnell’s focus on, 172, 198, 278

  military’s complacency about, 64, 105, 119

  Obama’s prioritizing of, 200–201

  resilience as goal of, 277

  Review Group’s prioritizing of, 257–58

  Wilhelm’s focus on, 40

  cyberspace, 41, 45

  as domain of warfare, 6

  Cyberspace Policy Review, 199–200

  Cyber War (Clarke), 241–42, 243

  DarkSeoul, 269

  data packets, 5–6, 131, 156, 157–58, 192–93, 194, 248, 249–50

  Dayton Accords, 110, 112

  DEF CON Hacking Conference, 136

  defense contractors:

  Chinese cyber attacks on, 224–25

  hacking of, 41

  Defense Department, U.S., 6, 18, 54, 67, 100, 257

  Advanced Research Projects Agency (ARPA), 7

  Critical Infrastructure Commission and, 49

  cyber attacks on, 47

  in Eligible Receiver, see Eligible Receiver 97 cyber attack exercise

  hacking and, 41

  IDS devices and, 81, 120, 176

  infrastructure policy directorate of, 43–44

  Internet connections to, 280

  J Department of, 43, 44

  Microwave, Space and Mobile Systems office of, 19

  Moonlight Maze cyber attack on, 78–79, 81–88, 119, 123, 212–13, 223

  National Communications System of, 177

 

‹ Prev