Read @War: The Rise of the Military-Internet Complex Online
Authors: Shane Harris
Tags: #Computers, #Non-Fiction, #Military, #History
Federal Bureau of Investigation (FBI),
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
fiber-optic trunk lines,
[>]
,
[>]
,
[>]
fifth domain, cyberspace as the,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
file-sharing networks,
[>]
â
[>]
financial and banking data systems: clearinghouse network,
[>]
; cyber breaches,
[>]
â
[>]
,
[>]
â
[>]
; cyber security,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; denial-of-service attacks,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; hack-back against Citadel,
[>]
â
[>]
; risks of malware use in military context,
[>]
â
[>]
,
[>]
.
See also
critical infrastructures
FinFisher software,
[>]
â
[>]
,
[>]
Firefox,
[>]
First Amendment,
[>]
FISA.
See
Foreign Intelligence Surveillance Act
Flatliquid operation,
[>]
â
[>]
,
[>]
n.
[>]
Foreign Intelligence Surveillance Act (FISA),
[>]
,
[>]
â
[>]
,
[>]
Foreign Intelligence Surveillance Court,
[>]
,
[>]
â
[>]
,
[>]
foreign policy, US: for China,
[>]
â
[>]
,
[>]
â
[>]
; international cyber agreements,
[>]
,
[>]
; and monitoring of foreigners,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
forensics, network,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
Fourth Amendment,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
France,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
F-35.
See
Joint Strike Fighter
future innovations in cyber security,
[>]
â
[>]
future scenario for cyberspace,
[>]
â
[>]
Â
Gates, Robert,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
Google: alliance with NSA,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
; China market,
[>]
; cyber security,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
; distributed computing,
[>]
; Gmail,
[>]
,
[>]
,
[>]
,
[>]
; NSA's secret monitoring of,
[>]
,
[>]
; retaliation against China,
[>]
â
[>]
,
[>]
,
[>]
n.
[>]
; telecommunications networks,
[>]
; user statistics,
[>]
gray market,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
Â
hack-backs,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
hackers: anonymity,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; catching (
see
hackers, catching); conferences,
[>]
,
[>]
,
[>]
,
[>]
; freelance,
[>]
,
[>]
â
[>]
; groups (
see
Anonymous; LulzSec); hacktivists,
[>]
,
[>]
; mercenaries,
[>]
â
[>]
,
[>]
; within the NSA (
see
Tailored Access Operations); as pirates/privateers,
[>]
; retaliation against (
see
hack-backs; private sector, retaliation by); trained for US cyber warfare,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
; “white hat” and “black hat,”
[>]
,
[>]
hackers, catching: bounty system,
[>]
; FBI activities,
[>]
â
[>]
; honeypots,
[>]
,
[>]
,
[>]
,
[>]
; imposter server,
[>]
; network forensics,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
; private companies as bait,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
Harris Corporation,
[>]
Hayden, Lt. Gen. Michael,
[>]
â
[>]
,
[>]
,
[>]
Hu, Jintao,
[>]
Huawei,
[>]
Hunton Williams,
[>]
.
See also
Team Themis
Â
iDefense,
[>]
India,
[>]
informants,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
Information Operations Center (IOC),
[>]
Information Operations Command,
[>]
intellectual property, cyber theft: by China,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
n.
[>]
(
see also
private sector, retaliation); of Google,
[>]
â
[>]
,
[>]
n.
[>]
; of Target,
[>]
,
[>]
Internet: anonymity,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; anticensorship projects,
[>]
,
[>]
; as a battlefield,
[>]
â
[>]
,
[>]
; domain issues,
[>]
,
[>]
; gateways,
[>]
,
[>]
; illegal activities (
see
cybercrime); inherent vulnerability in access to,
[>]
,
[>]
,
[>]
; invention,
[>]
; military-Internet complex,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
Internet browsers,
[>]
Internet protocol addresses: compilation (
see
Defense Industrial Base; Prism data collection); hiding (
see
Internet, anonymity); private companies that provide (
see
mercenaries); security,
[>]
,
[>]
,
[>]
,
[>]
Internet Security Systems,
[>]
Internet service providers: during bank cyber breach,
[>]
,
[>]
; CIA installation of spyware,
[>]
; concerns working with US government,
[>]
,
[>]
,
[>]
â
[>]
; and the NSA,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; as Tier
[>]
,
[>]
IOC.
See
Information Operations Center
Iran,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
.
See also
Stuxnet program
Iraq,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
Ironavenger operation,
[>]
Izz ad-Din al-Qassam Brigades,
[>]
,
[>]
Â
Johnson & Johnson,
[>]
Joint Chiefs of Staff,
[>]
,
[>]
â
[>]
,
[>]
Joint Special Operations Command (JSOC),
[>]
,
[>]
,
[>]
â
[>]
,
[>]
Joint Strike Fighter (F-35),
[>]
â
[>]
,
[>]
,
[>]
,
[>]
Â
keystroke monitoring,
[>]
,
[>]
,
[>]
,
[>]
kill chain,
[>]
.
See also
cyber kill chain
kill switch provision,
[>]
Kleiner Perkins Caufield & Byers,
[>]
Kosovo War,
[>]
Kuwait,
[>]
Â
LabMD,
[>]
law enforcement: city police,
[>]
; Europol,
[>]
; “law enforcement sensitive” data,
[>]
,
[>]
; prosecution,
[>]
,
[>]
.
See also
Federal Bureau of Investigation
leads, within communications metadata,
[>]
legal issues: bin Laden mission,
[>]
â
[>]
; cyber warfare with Iran,
[>]
; hacker used by government for illegal activities,
[>]
; information sharing,
[>]
; international laws less stringent,
[>]
,
[>]
,
[>]
,
[>]
; lawsuit against Stratfor,
[>]
; liability concerns,
[>]
,
[>]
; no international body/treaty in cyber warfare,
[>]
,
[>]
; of NSA communication monitoring (
see
legal issues, monitoring by the NSA); patent rights,
[>]
; retaliation (
see
legal issues, private sector retaliation); US law for covert operations vs. international law for military operations,
[>]
legal issues, monitoring by the NSA: attacking Tor nodes,
[>]
; of banks,
[>]
; contact chaining,
[>]
,
[>]
,
[>]
; under FISA,
[>]
,
[>]
â
[>]
; foreign/of foreigners,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
; RTRG,
[>]
â
[>]
; of individuals vs. groups of people,
[>]
â
[>]
; tapping,
[>]
,
[>]
,
[>]
legal issues, private sector retaliation: by Google,
[>]
â
[>]
,
[>]
â
[>]
; government action campaign,
[>]
; as illegal,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; legal permission,
[>]
,
[>]
,
[>]
,
[>]
legal rulings.
See
Foreign Intelligence Surveillance Court; US Department of Justice; US Supreme Court
Libya,
[>]
listening posts,
[>]
Lockheed Martin,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
log-in.
See
password security
Â
MAC.
See
Metadata Analysis Center
Magic Lantern software,
[>]
,
[>]
â
[>]
malware: e-mail as vehicle for,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
(
see also
e-mail, posing as legitimate); identification of targets (
see
spear-phishing); infiltration of al-Qaeda,
[>]
,
[>]
; installation strategies,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; kill switch to prevent,
[>]
; returned to hacker,
[>]
; reverse engineering of,
[>]
; used by the CIA,
[>]
,
[>]