Read @War: The Rise of the Military-Internet Complex Online
Authors: Shane Harris
Tags: #Computers, #Non-Fiction, #Military, #History
[>]
The CIA has also set up:
Barton Gellman and Ellen Nakashima, “US Spy Agencies Mounted 231 Offensive Cyber-Operations in 2011, Documents Show,”
Washington Post
, August 30, 2013,
http://articles.washingtonpost.com/2013-08-30/world/41620705_1_computer-worm-former-u-s-officials-obama-administration
.
[>]
But other data was:
See Siobhan Gorman, Adam Entous, and Andrew Dowell, “Technology Emboldened the NSA,”
Wall Street Journal
, June 9, 2013,
http://online.wsj.com/news/articles/SB10001424127887323495604578535290627442964
; and Noah Shachtman, “Inside DARPA's Secret Afghan Spy Machine,” Danger Room,
Wired
, July 21, 2011,
http://www.wired.com/dangerroom/2011/07/darpas-secret-spy-machine/
.
[>]
The airman, a linguist:
John Reed, “An Enlisted Airman Deciphered al-Qaeda's âConference Call' of Doom,”
Foreign Policy
, September 18, 2013.
[>]
The conference call was conducted:
Eli Lake and Josh Rogin, “US Intercepted al-Qaeda's âLegion of Doom' Conference Call,”
Daily Beast
, August 7, 2013,
http://www.thedailybeast.com/articles/2013/08/07/al-qaeda-conference-call-intercepted-by-u-s-officials-sparked-alerts.html
; and Eli Lake, “Courier Led US to al-Qaeda Internet Conference,”
Daily Beast
, August 20, 2013,
http://www.thedailybeast.com/articles/2013/08/20/exclusive-courier-led-u-s-to-al-qaeda-internet-conference.html
.
[>]
After he returned from Iraq:
Author interview with Bob Stasio, October 14, 2013.
Â
5. The Enemy Among Us
Â
[>]
Alexander informed”:
Siobhan Gorman, “Costly NSA Initiative Has a Shaky Takeoff,”
Baltimore Sun
, February 11, 2007,
http://articles.baltimoresun.com/2007-02-11/news/0702110034_1_turbulence-cyberspace-nsa
.
[>]
So
it was hardly surprising:
For details on the NSA's operations against Tor, see Shane Harris and John Hudson, “Not Even the NSA Can Crack the State Department's Favorite Anonymous Network,”
Foreign Policy
, October 7, 2013,
http://thecable.foreignpolicy.com/posts/2013/10/04/not_even_the_nsa_can_crack_the_state_departments_online_anonymity_tool#sthash.1H45fNxT.dpbs
; Barton Gellman, Craig Timberg, and Steven Rich, “Secret NSA Documents Show Campaign Against Tor Encrypted Network,”
Washington Post
, October 4, 2013,
http://articles.washingtonpost.com/2013-10-04/world/42704326_1_nsa-officials-national-security-agency-edward-snowden
; and James Ball, Bruce Schneir, and Glenn Greenwald, “NSA and GCHQ Target Tor Network That Protects Anonymity of Web Users,”
Guardian
, October 4, 2013,
http://www.theguardian.com/world/2013/oct/04/nsa-gchq-attack-tor-network-encryption
.
[>]
The hackers also considered trying:
The presentation can be found at
http://www.theguardian.com/world/interactive/2013/oct/04/tor-stinks-nsa-presentation-document
.
[>]
Under a secret program called:
Author interviews with technology company employees and experts. Also see classified budget documents published by the
New York Times
, which provide further detail about the project,
http://www.nytimes.com/interactive/2013/09/05/us/documents-reveal-nsa-campaign-against-encryption.html?ref=us
.
[>]
Working in conjunction with the FBI:
Glenn Greenwald et al., “Microsoft Handed the NSA Access to Encrypted Messages,”
Guardian
, July 11, 2013,
http://www.theguardian.com/world/2013/jul/11/microsoft-nsa-collaboration-user-data
.
[>]
But behind the scenes:
See Nicole Perlroth, Jeff Larson, and Scott Shane, “NSA Able to Foil Basic Safeguards of Privacy on the Web,”
New York Times
, September 5, 2013,
http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html?pagewanted=all
.
[>]
The noted computer security expert
Bruce Schneier:
Bruce Schneier, “Did NSA Put a Secret Backdoor in New Encryption Standard?”
Wired
, November 15, 2007,
http://www.wired.com/politics/security/commentary/securitymatters/2007/11/securitymatters_1115
.
[>]
The NSA then cited:
Joseph Menn, “Secret Contract Tied NSA and Security Industry Pioneer,” Reuters,
http://mobile.reuters.com/article/idUSBRE9BJ1C220131220?irpc=932
.
[>]
Neuberger called NIST:
The full audio version of the Neuberger interview is at
http://www.lawfareblog.com/2013/12/lawfare-podcast-episode-55-inside-nsa-part-iv-we-speak-with-anne-neuberger-the-woman-on-front-lines-of-nsas-relations-with-industry/
.
[>]
“NIST publicly proposed”:
EPIC's findings are summarized at
http://epic.org/crypto/dss/new_nist_nsa_revelations.html
.
[>]
In 1997, according to:
Cryptolog: Journal of Technical Health
23, no. 1 (Spring 1997),
http://cryptome.org/2013/03/nsa-cyber-think.pdf
.
[>]
This gray market is:
Information about the zero day gray market comes from author interviews with current and former US officials, as well as technical experts, including Chris Soghoian, principal technologist and senior policy analyst with the ACLU Speech, Privacy and Technology Project. Public documents and news articles provided additional information.
[>]
For instance, in 2005:
Tadayoshi Kohno, Andre Broido, and k. c. claffy, “Remote Physical Device Fingerprinting,”
http://www.caida.org/publications/papers/2005/fingerprinting/KohnoBroidoClaffy05-devicefingerprinting.pdf
.
[>]
A year after the paper was published:
Steven J. Murdoch, “Hot or Not: Revealing Hidden Services by Their Clock Skew,”
http://www.cl.cam.ac.uk/~sjm217/papers/ccs06hotornot.pdf
. See also Quinn Norton, “Computer Warming a Privacy Risk,”
Wired
, December 29, 2006,
http://www.wired.com/science/discoveries/news/2006/12/72375
.
[>]
“We don't sell weapons”:
Joseph Menn, “US Cyberwar Strategy Stokes Fear of Blowback,” Reuters, May 10, 2013,
http://www.reuters.com/article/2013/05/10/us-usa-cyberweapons-specialreport-idUSBRE9490EL20130510
.
[>]
In 2013 the NSA had a budget:
Barton Gellman and Ellen Nakashima, “US Spy Agencies Mounted 231 Offensive Cyber-Operations in 2011, Documents Show,”
Washington Post
, August 30, 2013,
http://articles.washingtonpost.com/2013-08-30/world/41620705_1_computer-worm-former-u-s-officials-obama-administration
.
[>]
“Graduates of the program become”:
“About the Program,” Systems and Network Interdisciplinary Program,
http://www.nsa.gov/careers/_files/SNIP.pdf
.
[>]
The company itself has been the target:
John Markoff, “Cyber Attack on Google Said to Hit Password System,”
New York Times
, April 19, 2010.
Â
6. The Mercenaries
Â
[>]
“Bonesaw is the ability to map”:
Aram Roston, “Nathaniel Fick, Former CNAS Chief, to Head Cyber Targeting Firm,”
C4ISR Journal
, JanuaryâFebruary 2013,
http://www.defensenews.com/article/20130115/C4ISR01/301150007/Nathaniel-Fick-Former-CNAS-Chief-Heads-Cyber-Targeting-Firm
.
[>]
Internal documents show:
Michael Riley and Ashlee Vance, “Cyber Weapons: The New Arms Race,”
Bloomberg Businessweek
, July 20, 2011,
http://www.businessweek.com/magazine/cyber-weapons-the-new-arms-race-07212011.html#p4
.
[>]
“Eventually we need to enable”:
Andy Greenberg, “Founder of Stealthy Security Firm Endgame to Lawmakers: Let US Companies âHack Back,'”
Forbes
, September 20, 2013,
http://www.forbes.com/sites/andygreenberg/2013/09/20/founder-of-stealthy-security-firm-endgame-to-lawmakers-let-u-s-companies-hack-back/
.
[>]
“If you believe that wars”:
Joseph Menn, “US Cyberwar Strategy Stokes Fear of Blowback,” Reuters, May 10, 2013,
http://www.reuters.com/article/2013/05/10/us-usa-cyberweapons-specialreport-idUSBRE9490EL20130510
.
[>]
One prominent player:
Information about CrowdStrike's techniques is based on author interviews with Steve Chabinksy, the company's general counsel and a former senior FBI official, conducted in July and August 2013. Additional information comes from the company's website.
[>]
But in an interview in 2013:
John Seabrook, “Network Insecurity: Are We Losing the Battle Against Cyber Crime?”
New Yorker
, May 20, 2013.
[>]
The firm Gamma:
Jennifer Valentino-Devries, “Surveillance Company Says It Sent Fake iTunes, Flash Updates,”
Wall Street Journal
, November 21, 2011,
http://blogs.wsj.com/digits/2011/11/21/surveillance-company-says-it-sent-fake-itunes-flash-updates-documents-show/
.
[>]
Security researchers also claim:
Vernon Silver, “Cyber Attacks on Activists Traced to FinFisher Spyware of Gamma,” Bloomberg.com, July 25, 2012,
http://www.bloomberg.com/news/2012-07-25/cyber-attacks-on-activists-traced-to-finfisher-spyware-of-gamma.html
.
[>]
Mansoor had inadvertently:
Vernon Silver, “Spyware Leaves Trail to Beaten Activist Through Microsoft Flaw,” Bloomberg.com, October 12, 2012,
http://www.bloomberg.com/news/2012-10-10/spyware-leaves-trail-to-beaten-activist-through-microsoft-flaw.html
.
[>]
Hacking Team had any knowledge:
Adrianne Jeffries, “Meet Hacking Team, the Company That Helps the Police Hack You,”
The Verge
, September 13, 2013,
http://www.theverge.com/2013/9/13/4723610/meet-hacking-team-the-company-that-helps-police-hack-into-computers
.
[>]
In the fall of 2010:
Shane Harris, “Killer App: Have a Bunch of Silicon Valley Geeks at Palantir Technologies Figured Out How to Stop Terrorists?”
Washingtonian
, January 31, 2012,
http://www.washingtonian.com/articles/people/killer-app/
.
[>]
The company claimed that:
Sindhu Sundar, “LabMD Says Gov't Funded the Data Breach at Probe's Center,” Law360,
http://www.law360.com/articles/488953/labmd-says-gov-t-funded-the-data-breach-at-probe-s-center
.
[>]
According to court documents:
The court document can be read at
https://www.courtlistener.com/ca11/5cG6/labmd-inc-v-tiversa-inc/?q=%22computer+fraud+and+abuse+act%22&refine=new&sort=dateFiled+desc
.
[>]
“It is illegal”:
Author interview.
[>]
In June 2013, Microsoft joined:
Jim Finkle, “Microsoft, FBI Take Aim at Global Cyber Crime Ring,” Reuters, June 5, 2013,
http://www.reuters.com/article/2013/06/05/net-us-citadel-botnet-idUSBRE9541KO20130605
.
[>]
The company's lawyers had used novel:
Jennifer Warnick, “Digital Detectives: Inside Microsoft's Headquarters for the Fight Against Cybercrime” Microsoft/Stories,
http://www.microsoft.com/en-us/news/stories/cybercrime/index.html
.
[>]
A survey of 181 attendees:
nCirle, Black Hat Survey,
BusinessWire
, July 2012,
http://www.businesswire.com/news/home/20120726006045/en/Black-Hat-Survey-36-Information-Security-Professionals#.UtMp8WRDtYo
.
[>]
Rick Howard:
Author interview, August 2013.
Â
7. Cops Become Spies
Â
[>]
It's called the Data Intercept Technology Unit:
Information about the unit comes from author interviews with current and former law enforcement officials, technology industry representatives, and legal experts, conducted in November 2013, as well as information on FBI websites. For more on Magic Lantern, see Bob Sullivan, “FBI Software Cracks Encryption Wall,” MSNBC, November 20, 2001,
http://www.nbcnews.com/id/3341694/ns/technology_and_science-security/t/fbi-software-cracks-encryption-wall/#.UsWEOmRDtYo
. See also Ted Bridis, “FBI Develops Eavesdropping Tools,” Associated Press, November 21, 2001,
http://globalresearch.ca/articles/BRI111A.html
.
[>]
“The bureau tends”:
Author interview, October 2013.
[>]
The number of counterterrorism agents:
G. W. Shulz, “FBI Agents Dedicated to Terror Doubled in Eight Years,” Center for Investigative Reporting, April 26, 2010,
http://cironline.org/blog/post/fbi-agents-dedicated-terror-doubled-eight-years-671
.
[>]
“We do a lot of collection”:
Author interview, November 2013.
[>]
The next morning, according to:
Friedman's account can be read at
http://www.stratfor.com/weekly/hack-stratfor
.
[>]
One of the hackers:
Vivien Lesnik Weisman, “A Conversation with Jeremy Hammond, American Political Prisoner Sentenced to 10 Years,”
Huffington Post
, November 19, 2013,
http://www.huffingtonpost.com/vivien-lesnik-weisman/jeremy-hammond-q-and-a_b_4298969.html
.
[>]
But Stratfor wasn't:
Nicole Perlroth, “Inside the Stratfor Attack,” Bits,
New York Times
, March 12, 2012,
http://bits.blogs.nytimes.com/2012/03/12/inside-the-stratfor-attack/?_r=0
.