@War: The Rise of the Military-Internet Complex (42 page)

Read @War: The Rise of the Military-Internet Complex Online

Authors: Shane Harris

Tags: #Computers, #Non-Fiction, #Military, #History

BOOK: @War: The Rise of the Military-Internet Complex
2.14Mb size Format: txt, pdf, ePub

counterterrorism,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

crashes, computer,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]

credit/debit cards,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

critical infrastructures: cyber attacks, annual,
[>]
,
[>]
; cyber attack threat,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; declaration of war issues,
[>]
,
[>]
,
[>]
; definition,
[>]
,
[>]
,
[>]
–
[>]
; executive orders,
[>]
–
[>]
,
[>]
–
[>]
,
[>]

Croom, Charlie,
[>]
,
[>]
,
[>]
,
[>]

crowdsourcing,
[>]
,
[>]

CrowdStrike Services,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

cryptologists,
[>]
,
[>]
,
[>]
,
[>]

Cyber Command.
See
US Cyber Command

cybercrime,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
.
See also
intellectual property; network forensics

cyber espionage,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
.
See also
China, cyber campaign against the US; spyware

cyber espionage by the US: of Americans,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
(
see also
Fourth Amendment; legal issues, monitoring by the NSA; privacy issues); by companies (
see under
private sector); by the FBI,
[>]
–
[>]
; of foreigners,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; global telecommunications,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
(
see also
Tailored Access Operations); by Mandiant,
[>]
–
[>]
; propaganda,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; of individuals vs. groups of people,
[>]
–
[>]
; two reasons for,
[>]

cyber kill chain,
[>]
–
[>]

cyber security: companies (
see under
private sector); cyber hygiene,
[>]
; cyber sentry model,
[>]
; defense tactics,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
; enemy among us,
[>]
–
[>]
; federal guidelines,
[>]
; future innovations,
[>]
–
[>]
; log-in and password,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; as a national priority,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; patent rights,
[>]
; shift from counterterrorism to,
[>]
,
[>]
,
[>]
,
[>]
; standards development,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
; used in marketing,
[>]
–
[>]
.
See also
National Security Agency, national cyber defense activities

cyberspace: characteristics,
[>]
,
[>]
,
[>]
; as civilian space vs. militarized zone,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; as the fifth domain of warfare,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; future scenario for,
[>]
–
[>]
; as the new domain of warfare,
[>]
–
[>]
,
[>]
–
[>]
; US policy to dominate,
[>]
,
[>]
–
[>]
,
[>]

cyber warfare: authority to begin (
see
authority for cyber warfare); with China, effects on the US,
[>]
,
[>]
,
[>]
; collateral damage,
[>]
,
[>]
(
see also
critical infrastructures); cyber arms market,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; cyber arms race,
[>]
,
[>]
,
[>]
,
[>]
; defense plan, national,
[>]
–
[>]
; defense vs. offense,
[>]
–
[>]
,
[>]
–
[>]
(
see also
cyber warfare, blurred distinction between defense and offense); early development,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; enemy among us,
[>]
–
[>]
; the first cyber war,
[>]
–
[>]
; identification of targets,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
; Internet as a battlefield,
[>]
–
[>]
; international agreements,
[>]
,
[>]
; mercenaries,
[>]
–
[>]
,
[>]
; by private companies (
see
hack-backs; private sector, retaliation); privatization,
[>]
,
[>]
–
[>]
; recruitment/training,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; rules of combat,
[>]
–
[>]
,
[>]
n.
[>]
; tactics (
see
tactics); target data,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; three missions of,
[>]
–
[>]
,
[>]
–
[>]
; use of term,
[>]
,
[>]
–
[>]

cyber warfare, blurred distinction between defense and offense: “active defense,”
[>]
,
[>]
; “defense” easier to sell,
[>]
–
[>]
; need to combine capability,
[>]
,
[>]
–
[>]
; and NSA–Cyber Command relationship,
[>]
,
[>]
,
[>]
; by private companies,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; pure information vs. military operations,
[>]
,
[>]
; with zero day information,
[>]
–
[>]
,
[>]
–
[>]

 

data collection and storage: CIA-NSA metadata,
[>]
–
[>]
,
[>]
–
[>]
; cloud,
[>]
,
[>]
,
[>]
; hacker history by Lockheed,
[>]
; phone data by NSA,
[>]
; Prism system,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; targeting data,
[>]
,
[>]
,
[>]

Data Intercept Technology Unit (DITU),
[>]
,
[>]
–
[>]

data management,
[>]
,
[>]

data mining,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

Davis, Maj. Gen. John,
[>]
,
[>]
,
[>]
–
[>]

Def Con conference,
[>]
,
[>]
,
[>]

Defense Cyber Crime Center,
[>]

Defense Industrial Base (DIB): creation,
[>]
,
[>]
,
[>]
; and DHS,
[>]
; expansion,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; function,
[>]
–
[>]
; ISP test without NSA aid,
[>]
–
[>]
; Lockheed sharing data with,
[>]
; number of members,
[>]
–
[>]

Defense Information Systems Agency,
[>]
,
[>]
,
[>]

Defense Intelligence Agency,
[>]
,
[>]

denial-of-service attacks,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

DHS.
See
US Department of Homeland Security

DIB.
See
Defense Industrial Base

distributed computing vs. centralized supercomputers,
[>]
,
[>]

DITU.
See
Data Intercept Technology Unit

documents/information: classified,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; classified threat intelligence sharing,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; declassified,
[>]
,
[>]
; pdf,
[>]
–
[>]
; unclassified,
[>]
–
[>]
,
[>]
,
[>]

DOD.
See
US Department of Defense

drives, USB.
See
thumb drives

drone technology,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

 

Eastern Europe,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

eBay,
[>]

Egypt,
[>]

Eisenhower, Dwight,
[>]
,
[>]
,
[>]

electrical power systems,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
n.
[>]
.
See also
critical infrastructures

Electronic Privacy Information Center,
[>]

e-mail: BlackBerry,
[>]
; cyber breaches,
[>]
,
[>]
,
[>]
,
[>]
; FBI sting,
[>]
–
[>]
; of foreigners vs. Americans,
[>]
–
[>]
,
[>]
; Gmail,
[>]
,
[>]
,
[>]
,
[>]
; Hotmail,
[>]
; and the Iraq War,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; monitoring,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; Outlook,
[>]
,
[>]
,
[>]
; posing as legitimate,
[>]
,
[>]
,
[>]
,
[>]
(
see also
malware, e-mail as vehicle for; spear-phishing; spyware, vehicles for); security,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; strategies for anonymity,
[>]
,
[>]
,
[>]

embassies,
[>]
,
[>]
,
[>]
–
[>]

encryption,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

encryption key,
[>]
,
[>]

Endgame,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

energy resources.
See
electrical power systems; nuclear facilities; petroleum power systems

engineering, reverse,
[>]

England, Gordon,
[>]

Estonia,
[>]

ethical issues: cyber offense by private companies,
[>]
; how sold information is used,
[>]
,
[>]
; placement of blame for zero day attack,
[>]
; responsibility to disclose vulnerabilities,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]

 

Facebook,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Other books

Fortunes of the Heart by Telfer Chaplin, Jenny
To Catch a Camden by Victoria Pade
With Friends Like These... by Gillian Roberts
Freddie Ramos Takes Off by Jacqueline Jules
Sliding Into Second by Ella Jade