Read @War: The Rise of the Military-Internet Complex Online
Authors: Shane Harris
Tags: #Computers, #Non-Fiction, #Military, #History
counterterrorism,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
crashes, computer,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
credit/debit cards,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
critical infrastructures: cyber attacks, annual,
[>]
,
[>]
; cyber attack threat,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
; declaration of war issues,
[>]
,
[>]
,
[>]
; definition,
[>]
,
[>]
,
[>]
â
[>]
; executive orders,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
Croom, Charlie,
[>]
,
[>]
,
[>]
,
[>]
CrowdStrike Services,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
Cyber Command.
See
US Cyber Command
cybercrime,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
.
See also
intellectual property; network forensics
cyber espionage,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
.
See also
China, cyber campaign against the US; spyware
cyber espionage by the US: of Americans,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
(
see also
Fourth Amendment; legal issues, monitoring by the NSA; privacy issues); by companies (
see under
private sector); by the FBI,
[>]
â
[>]
; of foreigners,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; global telecommunications,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
(
see also
Tailored Access Operations); by Mandiant,
[>]
â
[>]
; propaganda,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
; of individuals vs. groups of people,
[>]
â
[>]
; two reasons for,
[>]
cyber security: companies (
see under
private sector); cyber hygiene,
[>]
; cyber sentry model,
[>]
; defense tactics,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
; enemy among us,
[>]
â
[>]
; federal guidelines,
[>]
; future innovations,
[>]
â
[>]
; log-in and password,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; as a national priority,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; patent rights,
[>]
; shift from counterterrorism to,
[>]
,
[>]
,
[>]
,
[>]
; standards development,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
â
[>]
; used in marketing,
[>]
â
[>]
.
See also
National Security Agency, national cyber defense activities
cyberspace: characteristics,
[>]
,
[>]
,
[>]
; as civilian space vs. militarized zone,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
; as the fifth domain of warfare,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; future scenario for,
[>]
â
[>]
; as the new domain of warfare,
[>]
â
[>]
,
[>]
â
[>]
; US policy to dominate,
[>]
,
[>]
â
[>]
,
[>]
cyber warfare: authority to begin (
see
authority for cyber warfare); with China, effects on the US,
[>]
,
[>]
,
[>]
; collateral damage,
[>]
,
[>]
(
see also
critical infrastructures); cyber arms market,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
; cyber arms race,
[>]
,
[>]
,
[>]
,
[>]
; defense plan, national,
[>]
â
[>]
; defense vs. offense,
[>]
â
[>]
,
[>]
â
[>]
(
see also
cyber warfare, blurred distinction between defense and offense); early development,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
; enemy among us,
[>]
â
[>]
; the first cyber war,
[>]
â
[>]
; identification of targets,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
; Internet as a battlefield,
[>]
â
[>]
; international agreements,
[>]
,
[>]
; mercenaries,
[>]
â
[>]
,
[>]
; by private companies (
see
hack-backs; private sector, retaliation); privatization,
[>]
,
[>]
â
[>]
; recruitment/training,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; rules of combat,
[>]
â
[>]
,
[>]
n.
[>]
; tactics (
see
tactics); target data,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; three missions of,
[>]
â
[>]
,
[>]
â
[>]
; use of term,
[>]
,
[>]
â
[>]
cyber warfare, blurred distinction between defense and offense: “active defense,”
[>]
,
[>]
; “defense” easier to sell,
[>]
â
[>]
; need to combine capability,
[>]
,
[>]
â
[>]
; and NSAâCyber Command relationship,
[>]
,
[>]
,
[>]
; by private companies,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; pure information vs. military operations,
[>]
,
[>]
; with zero day information,
[>]
â
[>]
,
[>]
â
[>]
Â
data collection and storage: CIA-NSA metadata,
[>]
â
[>]
,
[>]
â
[>]
; cloud,
[>]
,
[>]
,
[>]
; hacker history by Lockheed,
[>]
; phone data by NSA,
[>]
; Prism system,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; targeting data,
[>]
,
[>]
,
[>]
Data Intercept Technology Unit (DITU),
[>]
,
[>]
â
[>]
data mining,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
Davis, Maj. Gen. John,
[>]
,
[>]
,
[>]
â
[>]
Def Con conference,
[>]
,
[>]
,
[>]
Defense Cyber Crime Center,
[>]
Defense Industrial Base (DIB): creation,
[>]
,
[>]
,
[>]
; and DHS,
[>]
; expansion,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
; function,
[>]
â
[>]
; ISP test without NSA aid,
[>]
â
[>]
; Lockheed sharing data with,
[>]
; number of members,
[>]
â
[>]
Defense Information Systems Agency,
[>]
,
[>]
,
[>]
Defense Intelligence Agency,
[>]
,
[>]
denial-of-service attacks,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
DHS.
See
US Department of Homeland Security
DIB.
See
Defense Industrial Base
distributed computing vs. centralized supercomputers,
[>]
,
[>]
DITU.
See
Data Intercept Technology Unit
documents/information: classified,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; classified threat intelligence sharing,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; declassified,
[>]
,
[>]
; pdf,
[>]
â
[>]
; unclassified,
[>]
â
[>]
,
[>]
,
[>]
DOD.
See
US Department of Defense
drives, USB.
See
thumb drives
drone technology,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
Â
Eastern Europe,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
eBay,
[>]
Egypt,
[>]
Eisenhower, Dwight,
[>]
,
[>]
,
[>]
electrical power systems,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
n.
[>]
.
See also
critical infrastructures
Electronic Privacy Information Center,
[>]
e-mail: BlackBerry,
[>]
; cyber breaches,
[>]
,
[>]
,
[>]
,
[>]
; FBI sting,
[>]
â
[>]
; of foreigners vs. Americans,
[>]
â
[>]
,
[>]
; Gmail,
[>]
,
[>]
,
[>]
,
[>]
; Hotmail,
[>]
; and the Iraq War,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; monitoring,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
; Outlook,
[>]
,
[>]
,
[>]
; posing as legitimate,
[>]
,
[>]
,
[>]
,
[>]
(
see also
malware, e-mail as vehicle for; spear-phishing; spyware, vehicles for); security,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; strategies for anonymity,
[>]
,
[>]
,
[>]
encryption,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
energy resources.
See
electrical power systems; nuclear facilities; petroleum power systems
engineering, reverse,
[>]
England, Gordon,
[>]
Estonia,
[>]
ethical issues: cyber offense by private companies,
[>]
; how sold information is used,
[>]
,
[>]
; placement of blame for zero day attack,
[>]
; responsibility to disclose vulnerabilities,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
Â