Read @War: The Rise of the Military-Internet Complex Online
Authors: Shane Harris
Tags: #Computers, #Non-Fiction, #Military, #History
Accumulo software,
[>]
activists, political,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
advanced persistent threat (APT),
[>]
,
[>]
,
[>]
â
[>]
,
[>]
Afghanistan,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
aircraft, military,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
n.
[>]
air gap,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
air traffic control,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
Alexander, Gen. Keith: bid for NSA's authority by,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
; as director of NSA,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; lobbying,
[>]
,
[>]
,
[>]
; military cyber breach,
[>]
â
[>]
; national cyber defense plan,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
; recruitment by,
[>]
,
[>]
,
[>]
algorithm, encryption,
[>]
â
[>]
,
[>]
Allen & Company,
[>]
al-Qaeda: campaign in Iraq,
[>]
,
[>]
,
[>]
; conference call information,
[>]
; corporate intranet of, sabotage,
[>]
,
[>]
; NSA cyber warfare against,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
; recruitment by,
[>]
; sanctuary in Afghanistan,
[>]
; Sunni Awakening denouncement of,
[>]
; US cell phone monitoring,
[>]
,
[>]
,
[>]
,
[>]
American Express,
[>]
,
[>]
â
[>]
anonymity issues,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
Anonymous (hacker group),
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
Apple,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
APT.
See
advanced persistent threat
APT1.
See
Unit 61398/APT1
Aramco,
[>]
Ashcroft, John,
[>]
attribution problem,
[>]
Aurora.
See
China, cyber campaign against the US
Australia,
[>]
authority for cyber warfare: conference call cabinet,
[>]
; covert operations vs. military operations,
[>]
; critical infrastructures and legal issues,
[>]
,
[>]
,
[>]
; Cyber Command for cyber attack,
[>]
â
[>]
; and definition of “hostile act,”
[>]
; FBI for domestic attack,
[>]
,
[>]
; government action campaign for private sector,
[>]
; president,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; Strategic Command for coordinated military attack,
[>]
Â
backdoors,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
Bank of America,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
banks.
See
financial and banking data systems
Basla, Lt. Gen. Michael,
[>]
,
[>]
,
[>]
Berlin, Charles,
[>]
big ass graph,
[>]
bin Laden, Osama,
[>]
,
[>]
,
[>]
â
[>]
black-bag operations,
[>]
,
[>]
,
[>]
Black Hat conference,
[>]
,
[>]
,
[>]
,
[>]
blackout (electrical),
[>]
,
[>]
,
[>]
â
[>]
,
[>]
blackout (media),
[>]
Bonesaw software,
[>]
Booz Allen Hamilton,
[>]
,
[>]
,
[>]
Bosnia,
[>]
Boys & Girls Clubs of America,
[>]
bSafe toolkit,
[>]
Bush, George W.: cyber warfare authorization,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; national cyber defense plan,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; NSA authorizations,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
businesses.
See
contractors, defense; private sector
Â
camera/video data,
[>]
,
[>]
,
[>]
,
[>]
Carnivore software,
[>]
cell phones: in Afghanistan,
[>]
,
[>]
; al-Qaeda,
[>]
,
[>]
,
[>]
,
[>]
; contact chaining,
[>]
,
[>]
,
[>]
â
[>]
; disruption tactics,
[>]
,
[>]
â
[>]
; iPhone,
[>]
,
[>]
,
[>]
; in Iraq,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
; tracking of owner,
[>]
,
[>]
Central Command for the Middle East,
[>]
,
[>]
â
[>]
Central Intelligence Agency (CIA): al-Qaeda,
[>]
,
[>]
,
[>]
,
[>]
; cloud built for,
[>]
; drone technology,
[>]
,
[>]
; and Endgame,
[>]
,
[>]
,
[>]
; human spies,
[>]
,
[>]
; Information Operations Center,
[>]
; Iraq War,
[>]
; partnerships,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
; Technology Management Office,
[>]
; venture capital group of,
[>]
,
[>]
Cheney, Dick,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
China: activists,
[>]
,
[>]
,
[>]
,
[>]
; growth,
[>]
â
[>]
; as lender to the US,
[>]
â
[>]
; NSA cyber espionage on university,
[>]
â
[>]
; People's Liberation Army,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
; trade with US,
[>]
,
[>]
,
[>]
,
[>]
; US bombing of embassy,
[>]
; US cyber espionage against,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
; US foreign relations,
[>]
â
[>]
,
[>]
â
[>]
; war with US, consequences,
[>]
,
[>]
,
[>]
China, cyber campaign against the US (Aurora): as an APT,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
; Chinese government position on,
[>]
,
[>]
,
[>]
,
[>]
; context,
[>]
â
[>]
; energy/power systems,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
; extent,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
; F-35 jet,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
; intellectual property (
see
intellectual property, cyber theft, by China); Mandiant report on,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
; Obama administration on,
[>]
; recruitment,
[>]
â
[>]
,
[>]
; tracking by the US,
[>]
â
[>]
,
[>]
,
[>]
; Unit 61398/APT1,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; US government sites,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
; US media,
[>]
â
[>]
CIA.
See
Central Intelligence Agency
Cisco,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
civil rights,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
classified information.
See
documents/information, classified
clearinghouse network,
[>]
Clinton, Hillary,
[>]
,
[>]
,
[>]
,
[>]
clock skew,
[>]
cloud storage service,
[>]
,
[>]
,
[>]
Coca-Cola,
[>]
Cold War,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
command-and-control servers,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
Computer Associates,
[>]
computers: cameras in,
[>]
,
[>]
,
[>]
; captured laptops,
[>]
,
[>]
; hijacked,
[>]
; internal clocks,
[>]
; tagging specific,
[>]
conferences, hacker,
[>]
,
[>]
,
[>]
,
[>]
Conlon, Brendan,
[>]
Constitution, US,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
contact chaining/call chains,
[>]
,
[>]
,
[>]
â
[>]
contractors, defense: cyber breaches,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
n.
[>]
; cyber security firms,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; major,
[>]
,
[>]
; role in US military,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; use of zero day market,
[>]
,
[>]
.
See also
Defense Industrial Base; military-industrial complex