@War: The Rise of the Military-Internet Complex (41 page)

Read @War: The Rise of the Military-Internet Complex Online

Authors: Shane Harris

Tags: #Computers, #Non-Fiction, #Military, #History

BOOK: @War: The Rise of the Military-Internet Complex
7.26Mb size Format: txt, pdf, ePub
Index

Accumulo software,
[>]

activists, political,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Adobe,
[>]
,
[>]
–
[>]

advanced persistent threat (APT),
[>]
,
[>]
,
[>]
–
[>]
,
[>]

Afghanistan,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]

agent, malware,
[>]
–
[>]

Agent.btz,
[>]
–
[>]
,
[>]
–
[>]

aircraft, military,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
n.
[>]

air gap,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

air traffic control,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

Alexander, Gen. Keith: bid for NSA's authority by,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; as director of NSA,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; lobbying,
[>]
,
[>]
,
[>]
; military cyber breach,
[>]
–
[>]
; national cyber defense plan,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; recruitment by,
[>]
,
[>]
,
[>]

algorithm, encryption,
[>]
–
[>]
,
[>]

Allen & Company,
[>]

al-Qaeda: campaign in Iraq,
[>]
,
[>]
,
[>]
; conference call information,
[>]
; corporate intranet of, sabotage,
[>]
,
[>]
; NSA cyber warfare against,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; recruitment by,
[>]
; sanctuary in Afghanistan,
[>]
; Sunni Awakening denouncement of,
[>]
; US cell phone monitoring,
[>]
,
[>]
,
[>]
,
[>]

Amazon,
[>]
,
[>]

American Express,
[>]
,
[>]
–
[>]

anonymity issues,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

Anonymous (hacker group),
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

Apple,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

APT.
See
advanced persistent threat

APT1.
See
Unit 61398/APT1

Aramco,
[>]

Ashcroft, John,
[>]

AT&T,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

attribution problem,
[>]

Aurora.
See
China, cyber campaign against the US

Australia,
[>]

authority for cyber warfare: conference call cabinet,
[>]
; covert operations vs. military operations,
[>]
; critical infrastructures and legal issues,
[>]
,
[>]
,
[>]
; Cyber Command for cyber attack,
[>]
–
[>]
; and definition of “hostile act,”
[>]
; FBI for domestic attack,
[>]
,
[>]
; government action campaign for private sector,
[>]
; president,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; Strategic Command for coordinated military attack,
[>]

 

backdoors,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Bahrain,
[>]
,
[>]

Bank of America,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]

banks.
See
financial and banking data systems

Barr, Aaron,
[>]
–
[>]

Basla, Lt. Gen. Michael,
[>]
,
[>]
,
[>]

beacons,
[>]
–
[>]

Beckstrom, Rod,
[>]
–
[>]

Berico Technologies,
[>]
,
[>]

Berlin, Charles,
[>]

big ass graph,
[>]

bin Laden, Osama,
[>]
,
[>]
,
[>]
–
[>]

black-bag operations,
[>]
,
[>]
,
[>]

Black Hat conference,
[>]
,
[>]
,
[>]
,
[>]

blackout (electrical),
[>]
,
[>]
,
[>]
–
[>]
,
[>]

blackout (media),
[>]

Bonesaw software,
[>]

Booz Allen Hamilton,
[>]
,
[>]
,
[>]

Bosnia,
[>]

botnets,
[>]
,
[>]
,
[>]
,
[>]

Boys & Girls Clubs of America,
[>]

Brazil,
[>]
–
[>]
,
[>]
n.
[>]

Britain,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

bSafe toolkit,
[>]

Buckshot Yankee,
[>]
–
[>]
,
[>]

Bush, George W.: cyber warfare authorization,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; national cyber defense plan,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; NSA authorizations,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

businesses.
See
contractors, defense; private sector

 

Calderón, Felipe,
[>]
–
[>]

camera/video data,
[>]
,
[>]
,
[>]
,
[>]

Canada,
[>]
,
[>]
–
[>]
,
[>]

Carnivore software,
[>]

cell phones: in Afghanistan,
[>]
,
[>]
; al-Qaeda,
[>]
,
[>]
,
[>]
,
[>]
; contact chaining,
[>]
,
[>]
,
[>]
–
[>]
; disruption tactics,
[>]
,
[>]
–
[>]
; iPhone,
[>]
,
[>]
,
[>]
; in Iraq,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; tracking of owner,
[>]
,
[>]

censorship,
[>]
,
[>]
,
[>]

Central Command for the Middle East,
[>]
,
[>]
–
[>]

Central Intelligence Agency (CIA): al-Qaeda,
[>]
,
[>]
,
[>]
,
[>]
; cloud built for,
[>]
; drone technology,
[>]
,
[>]
; and Endgame,
[>]
,
[>]
,
[>]
; human spies,
[>]
,
[>]
; Information Operations Center,
[>]
; Iraq War,
[>]
; partnerships,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
; Technology Management Office,
[>]
; venture capital group of,
[>]
,
[>]

CenturyLink,
[>]
,
[>]
,
[>]
,
[>]

Chabinsky, Steve,
[>]
,
[>]

Cheney, Dick,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

Chertoff, Michael,
[>]
–
[>]

children's issues,
[>]
–
[>]

China: activists,
[>]
,
[>]
,
[>]
,
[>]
; growth,
[>]
–
[>]
; as lender to the US,
[>]
–
[>]
; NSA cyber espionage on university,
[>]
–
[>]
; People's Liberation Army,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; trade with US,
[>]
,
[>]
,
[>]
,
[>]
; US bombing of embassy,
[>]
; US cyber espionage against,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; US foreign relations,
[>]
–
[>]
,
[>]
–
[>]
; war with US, consequences,
[>]
,
[>]
,
[>]

China, cyber campaign against the US (Aurora): as an APT,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
; Chinese government position on,
[>]
,
[>]
,
[>]
,
[>]
; context,
[>]
–
[>]
; energy/power systems,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; extent,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
; F-35 jet,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
; intellectual property (
see
intellectual property, cyber theft, by China); Mandiant report on,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; Obama administration on,
[>]
; recruitment,
[>]
–
[>]
,
[>]
; tracking by the US,
[>]
–
[>]
,
[>]
,
[>]
; Unit 61398/APT1,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; US government sites,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; US media,
[>]
–
[>]

CIA.
See
Central Intelligence Agency

Cisco,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]

Citadel,
[>]
–
[>]

civil rights,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

classified information.
See
documents/information, classified

clearinghouse network,
[>]

Clinton, Hillary,
[>]
,
[>]
,
[>]
,
[>]

clock skew,
[>]

cloud storage service,
[>]
,
[>]
,
[>]

Coca-Cola,
[>]

Cold War,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

Comey, James,
[>]
,
[>]

command-and-control servers,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Computer Associates,
[>]

computers: cameras in,
[>]
,
[>]
,
[>]
; captured laptops,
[>]
,
[>]
; hijacked,
[>]
; internal clocks,
[>]
; tagging specific,
[>]

conferences, hacker,
[>]
,
[>]
,
[>]
,
[>]

Conlon, Brendan,
[>]

Constitution, US,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

contact chaining/call chains,
[>]
,
[>]
,
[>]
–
[>]

contractors, defense: cyber breaches,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
n.
[>]
; cyber security firms,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; major,
[>]
,
[>]
; role in US military,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; use of zero day market,
[>]
,
[>]
.
See also
Defense Industrial Base; military-industrial complex

Other books

The Fangs of Bloodhaven by Cheree Alsop
A Week In Hel by Pro Se Press
Face the Fire by Nora Roberts
Dead Man on the Moon by Steven Harper
The Well of Truth by Amber Riley
Beyond Evidence by Emma L Clapperton
From Leather to Lace by Jasmine Hill