by Fred Kaplan
Trailblazer, 132, 156–57, 158
Transportation Department, U.S., North Korean cyber attack on, 213
Treasury Department, U.S.:
cyber security as low priority of, 172–73
North Korean cyber attack on, 213
“Trilateral Memorandum Agreement,” 216–17
Truman, Harry, 12
Turbulence, 157–58, 195
Unit 8200 (Israel), 161
United Arab Emirates, 75, 76
United States:
Chinese relations with, 221–28
as digital communications hub, 191–92, 193, 248
see also five eyes
university computers, as entry points for hackers, 61, 73, 82
UNIX operating system, Sun Solaris vulnerability in, 73–74
U.N. Security Council, 58
USA Freedom Act (2015), 263
USA Patriot Act, see Patriot Act
“U.S. Cyber Operations Policy” (PPD-20), 217–20, 228, 314n–15n
“U.S. Policy on Counterterrorism” (PDD-39), 39–40, 46, 89
Vatis, Michael, 46
VeriSign, bandwidth map of, 191, 193
Vessey, John “Jack,” 2, 6, 7, 19, 287n–88n
VirusBlokAda, 210
voice encryption, 36–37
Walmart, 52
Ware, Willis, 8–9, 10, 17, 34, 51, 54, 241, 276
WarGames (film), 1–3, 6, 9–10, 19, 32, 42, 59, 65, 77, 94, 175, 287n
Washington Post, 228, 241, 288n–89n
weapons of mass destruction (WMDs), 74
Weaver, Andrew, 108
Wells, Linton, 44
West Point, U.S. Military Academy at, 148
White, John, 48–49, 50
Wilhelm, Richard, 22, 33, 42, 48, 97
in Critical Infrastructure Working Group, 40–41
as NSA director of information warfare, 32, 40
World Trade Center:
9/11 attack on, 141, 171, 174, 241
1993 bombing of, 35
World War I, 11
World War II, 4, 11, 215, 278
World Wide Web, 5, 131, 195
see also Internet
worms, 182, 205–6
Wright-Patterson Air Force Base, cyber attack on, 78–79, 84
Wyden, Ron, 232–33
Xi Jinping, 228–29, 308n
Y2K crisis, 99
Yahoo, 102, 247
Yeltsin, Boris, 87
YouTube, 247, 266
Zatko, Peiter (Mudge), 91–95, 98, 102–4, 274
zero-day vulnerabilities, 137, 206
Obama policy on exploiting of, 260–61
Review Group recommendations for, 25
Simon & Schuster
1230 Avenue of the Americas
New York, NY 10020
www.SimonandSchuster.com
Copyright © 2016 by Fred Kaplan
All rights reserved, including the right to reproduce this book or portions thereof in any form whatsoever. For information, address Simon & Schuster Subsidiary Rights Department, 1230 Avenue of the Americas, New York, NY 10020.
First Simon & Schuster hardcover edition March 2016
SIMON & SCHUSTER and colophon are registered trademarks of Simon & Schuster, Inc.
For information about special discounts for bulk purchases, please contact Simon & Schuster Special Sales at 1-866-506-1949 or [email protected].
The Simon & Schuster Speakers Bureau can bring authors to your live event. For more information or to book an event, contact the Simon & Schuster Speakers Bureau at 1-866-248-3049 or visit our website at www.simonspeakers.com.
Book design by Ellen R. Sasahara
Jacket design by Jackie Seow
Library of Congress Cataloging-in-Publication Data
Kaplan, Fred M. Dark territory : the secret history of cyber war / Fred Kaplan. New York, NY : Simon & Schuster, 2016. | Includes bibliographical references and index.
LCSH: Cyberterrorism—Prevention—United States—History. | BISAC:
TECHNOLOGY & ENGINEERING / Military Science. | COMPUTERS /
Security /
Viruses. | HISTORY / Military / General.
Classification: LCC HV6773.15.C97 K37 2016 | DDC 363.325—dc23 LC record available at http://lccn.loc.gov/2015027335
ISBN 978-1-4767-6325-5
ISBN 978-1-4767-6327-9 (ebook)