Read @War: The Rise of the Military-Internet Complex Online
Authors: Shane Harris
Tags: #Computers, #Non-Fiction, #Military, #History
Mandia, Kevin,
[>]
Mandiant,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
McConnell, Mike: background,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; cyber warfare proposal to NSC,
[>]
â
[>]
,
[>]
; development of Cyber Command,
[>]
â
[>]
; as director of national intelligence,
[>]
,
[>]
â
[>]
; as director of NSA,
[>]
,
[>]
â
[>]
; national cyber defense plan,
[>]
â
[>]
,
[>]
,
[>]
; security briefing with Obama,
[>]
â
[>]
,
[>]
medical data and facilities,
[>]
,
[>]
,
[>]
,
[>]
Metadata Analysis Center (MAC),
[>]
â
[>]
Microsoft,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
Middle East,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
military: command-and-control structure,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; communications monitoring,
[>]
â
[>]
; cyber espionage on members,
[>]
; cyber recruitment and training,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
; rules of combat,
[>]
â
[>]
,
[>]
n.
[>]
.
See also
warfare
military-industrial complex,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
military-Internet complex,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
military networks: command-and-control structure, cyber,
[>]
â
[>]
,
[>]
; cyber breaches,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
n.
[>]
; mission to defend,
[>]
â
[>]
,
[>]
â
[>]
; weapons systems,
[>]
,
[>]
,
[>]
,
[>]
Miller, Charlie,
[>]
missile systems,
[>]
Monsegur, Hector Xavier,
[>]
â
[>]
Mubarak, Hosni,
[>]
Mullen, Adm. Mike,
[>]
â
[>]
,
[>]
Â
National Aeronautics and Space Administration (NASA),
[>]
â
[>]
National Institute of Standards and Technology (NIST),
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
National Park Service,
[>]
National Reconnaissance Office,
[>]
,
[>]
National Security Agency (NSA): alliance with private sector,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
(
see also
Defense Industrial Base; Prism data collection); alliance with the FBI,
[>]
â
[>]
,
[>]
; anti-Tor campaign,
[>]
â
[>]
; Commander's Action Group,
[>]
â
[>]
; communications monitoring by (
see
National Security Agency, communications monitoring); Computer Network Operations,
[>]
; creation,
[>]
,
[>]
â
[>]
; Cyber Center,
[>]
; data collection and management,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; development of sabotage capability,
[>]
(
see also
al-Qaeda); distrust of,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
; Fort Meade headquarters,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; Google retaliation,
[>]
â
[>]
,
[>]
; hunt team,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; insertion of vulnerabilities by,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; leak by Snowden (
see
Snowden, Edward); military cyber breach,
[>]
â
[>]
,
[>]
; National Cyber Investigative Joint Task Force,
[>]
; National Security Operations Center,
[>]
; national cyber defense plan (
see
National Security Agency, national cyber defense activities); natural gas system cyber breach,
[>]
; network forensics,
[>]
; 9/11 and the executive order,
[>]
â
[>]
; Office of General Counsel,
[>]
,
[>]
; PDD-
[>]
plans,
[>]
,
[>]
n.
[>]
; personnel deployed to war,
[>]
; personnel working on cyber defense,
[>]
; privacy issues,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
(
see also
National Security Agency, distrust of); Product Line,
[>]
â
[>]
; Signals Intelligence Directorate,
[>]
,
[>]
,
[>]
,
[>]
; Special Collection Service,
[>]
â
[>]
; Special Source Operations,
[>]
â
[>]
,
[>]
â
[>]
; Starburst/Stellar program,
[>]
; System and Network Interdisciplinary Program,
[>]
; TAO unit (
see
Tailored Access Operations); threat signature compilation,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
(
see also
Defense Industrial Base); track-the-hacker programs,
[>]
â
[>]
; trainees,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
; Tranche 2 plan,
[>]
â
[>]
,
[>]
; Transgression Branch,
[>]
; war games,
[>]
â
[>]
; zero day exploit stockpiling,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
National Security Agency (NSA), communications monitoring: Afghanistan,
[>]
,
[>]
â
[>]
; Chinese university,
[>]
â
[>]
; code words used by,
[>]
,
[>]
n.
[>]
; contact chaining/call chains,
[>]
,
[>]
,
[>]
â
[>]
; domestic,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; global,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; Iraq,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
; legal issues (
see
under
legal issues); Libya,
[>]
; Mexico,
[>]
â
[>]
; Pakistan,
[>]
; Real Time Regional Gateway,
[>]
â
[>]
; Syria,
[>]
; tapping,
[>]
,
[>]
,
[>]
,
[>]
; Tutelage scanning system,
[>]
National Security Agency (NSA), national cyber defense activities: bid for position of authority,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
; early coordination,
[>]
â
[>]
,
[>]
; loss of authority,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; and Obama,
[>]
,
[>]
â
[>]
; proposal to Bush,
[>]
â
[>]
,
[>]
,
[>]
National Security Council (NSC),
[>]
â
[>]
,
[>]
natural gas systems,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
NetWitness software,
[>]
network forensics,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
Neuberger, Anne,
[>]
Next Generation Cyber Initiative,
[>]
Nieto, Enrique Peña,
[>]
9/11 attacks,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
NIST.
See
National Institute of Standards and Technology
North Korea,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
Northrop Grumman,
[>]
,
[>]
,
[>]
,
[>]
NSA.
See
National Security Agency
NSC.
See
National Security Council
nuclear facilities,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
.
See also
Stuxnet program
Â
Obama, Barack: China relations,
[>]
,
[>]
â
[>]
; critical infrastructure executive orders,
[>]
â
[>]
,
[>]
,
[>]
; cyber security as a top priority,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
; homeland security executive order,
[>]
; and the Mandiant report,
[>]
â
[>]
,
[>]
â
[>]
; and the NSA,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
; PDD-
[>]
presidential directive,
[>]
,
[>]
n.
[>]
; security briefing with McConnell,
[>]
â
[>]
,
[>]
Office of the Director of National Intelligence,
[>]
,
[>]
,
[>]
operations, cyber warfare: black bag jobs,
[>]
,
[>]
,
[>]
; Buckshot Yankee,
[>]
â
[>]
,
[>]
; Flatliquid,
[>]
â
[>]
,
[>]
n.
[>]
; Freedomnet,
[>]
; Ironavenger,
[>]
; natural gas system investigation,
[>]
â
[>]
,
[>]
; Operation Aurora (
see
China, cyber campaign against the US); Operation b54,
[>]
,
[>]
; Operation Byzantine Foothold,
[>]
; Shifting Shadow,
[>]
â
[>]
; Stuxnet,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; Tranche 2 plan,
[>]
â
[>]
,
[>]
; Turbulence program,
[>]
Â
Packeteer software,
[>]