Authors: Fred Kaplan
“with other government agencies”:
Department of Defense,
The Department of Defense Cyber Strategy
, April 2015; quotes on 5, 14, emphasis added; see also 6,
http://www.defense.gov/home/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf
. The document clarified that the government would be responsible for deterring and possibly responding only to cyber attacks “of significant consequence,” which, it added, “may include loss of life, significant damage to property, serious adverse U.S. foreign policy consequences, or serious economic impact on the United States.” The terms “significant” and “serious” remained undefinedâRobert Gates's question, nine years earlier, of what kind of cyber attack constitutes an act of war remained unansweredâbut the finesse reflected an understanding that all such questions are ultimately political, to be decided by political leaders. It also reflected the inescapable fact that this was not just dark but untrod territory.
“How do we increase”:
Ellen Nakashima, “Cyber Chief: Efforts to Deter Attacks Against the US Are Not Working,”
Washington Post
, March 19, 2015.
“probably one or two”:
Patricia Zengerle, “NSA Chief Warns Chinese Cyber Attack Could Shut U.S. Infrastructure,” Reuters, Nov. 21, 2014,
http://www.reuters.com/article/2014/11/21/usa-security-nsa-idUSL2N0TB0IX20141121
.
“The American public”: Liberty and Security in a Changing World:
President's Review Group, 62.
A note about the index:
The pages referenced in this index refer to the page numbers in the print edition. Clicking on a page number will take you to the ebook location that corresponds to the beginning of that page in the print edition. For a comprehensive list of locations of any word or phrase, use your reading system's search function.
cyber warfare as priority of,
145
â48,
149
â50
Abkhazia,
164
â65
Abraham Lincoln,
USS,
147
Absolute Weapon, The
(Brodie),
277
U.S. war in,
208
Against All Enemies
(Clarke),
240
agent.btz (computer worm),
182
Air Combat Command, Information Warfare Branch of,
107
,
110
Office of Special Investigations of,
85
,
87
Air Force Cryptology Support Center,
62
Air Force Information Operations Center,
225
Air Force Information Warfare Center (Air Intelligence Agency),
7
,
32
,
58
â59,
85
,
107
,
108
,
110
,
111
,
112
,
122
â23,
126
,
137
,
161
,
176
,
212
,
223
,
225
,
292
n
â93
n,
296
n
Computer Emergency Response Team of,
62
â63,
69
,
73
demon-dialing counter-C2 plan of,
59
,
64
Network Security Monitoring program of,
60
â61,
62
Air Force Scientific Advisory Board,
51
Air Force Systems Command,
50
Alexander, Keith,
148
â49,
173
,
213
as Army deputy chief of staff for intelligence,
149
â50
as Army Intelligence and Security commander,
148
,
152
,
154
â55,
196
BuckShot Yankee and,
182
â84
CNE and,
180
cyber warfare expertise of,
149
,
157
â58
Hayden's conflicts with,
152
â53,
154
â55
infrastructure security and,
280
â82
metadata and,
230
,
231
,
233
,
253
,
256
as NSA director,
152
,
155
â56,
174
,
178
â81,
182
â84,
185
â86,
187
,
189
,
204
,
211
,
214
,
231
,
244
,
247
,
252
,
253
,
256
Obama information-sharing bill opposed by,
281
â82
PRISM and,
247
and Snowden leaks,
231
Stuxnet attack and,
204
â5,
206
Turbulence and,
157
â58
al Qaeda,
140
,
142
â43,
147
,
151
,
171
,
192
,
197
,
240
â41,
245
Amazon,
102
American Civil Liberties Union (ACLU),
239
American Electrical Power Company,
167
Anderson, Jack,
288
n
â89
n
Andrews, Duane,
54
Andrews Air Force Base, cyber attack on,
73
,
74
AntiOnline,
77
AOL, PRISM and,
247
Apple, PRISM and,
247
Intelligence and Security Command of,
148
,
152
â55,
196
Land Information Warfare Activity of,
32
,
123
Army Intelligence Center,
148
â49
Arquilla, John,
291n
Asia Society, Donilon's speech at,
221
â22,
226
â27
Assad, Bashar al-,
160
â61,
198
Assante, Michael,
166
â67
@stake,
103
Aurora Generator Test,
166
â69,
171
,
174
,
204
,
206
,
241
Australia,
see
five eyes
auto industry,
199
automobiles, hacking of computers in,
273
n
â74
n
Baghdad,
22
Balad Air Base, Iraq,
159
Balkans, 1999 NATO bombing of,
112
â14,
115
,
119
,
161
banking industry:
cyber security as low priority of,
175
2008 crisis in,
199
Basra,
22
Bates, John,
250
Baywatch
(TV show),
112
beacons (cyber tracking code),
83
,
181
â82,
207
Bell Corporation,
44
Bellknap, Lloyd,
62
bin Laden, Osama,
89
,
90
,
140
,
142
â43
killing of,
239
Black Chamber,
11
Bloomberg Businessweek,
268
BND,
235
BNN,
95
Boeing,
132
Booz Allen Hamilton,
132
,
172
,
173
,
176
Border Gateway Protocol,
93
Bosnia-Herzegovina,
110
â11,
146
Bremer, L. Paul,
147
Brezhnev, Leonid,
12
Brown, Michael,
187
â88
Alexander and,
182
â84
Bush, George H. W.,
21
,
24
,
44
,
66
Bush, George W.,
3
,
103
,
171
,
173
,
175
â76,
216
,
225
,
304
n
â5
n
Iraq insurgency and,
150
Iraq invasion and,
142
â43,
145
,
147
Iraq troop surge ordered by,
158
,
173
McConnell's cyber warfare briefing of,
173
â75,
187
Obama's Stuxnet briefing by,
203
Stellar Wind and,
155
n
Stuxnet and,
203
,
205
,
206
,
208
,
209
,
212
,
215
Bush (G.W.) administration:
cyber security as viewed in,
140
â41
cyber warfare and,
3
terrorism as low priority of,
140
â41
warnings on al Qaeda ignored by,
240
â41
Butler, Robert,
279
Campbell, John “Soup,” 70â71,
110
â11,
121
,
122
JTF-CND headed by,
81
â82,
83
â84,
88
Canada,
see
five eyes
Cannon, Lou,
287
n
â88
n
Carter, Ashton,
283
Cartwright, James,
219
Casablanca
(film),
234
â35
Casey, William,
27
Central Command, U.S.,
145
â46,
147
â48,
149
,
152
,
207
,
Central Intelligence Agency (CIA),
6
,
27
,
45
,
49
,
126
,
146
,
147
,
151
,
185
,
229
,
238
â39
civil liberties abuses by,
192
Critical Defense Technologies Division of,
7
Hayden as director of,
215
Information Operations Center of,
113
,
134
,
161
,
207
NSA interaction with,
133
â34
Charney, Howard,
235
Cheney, Dick,
24
,
140
,
174
,
203
â4
Chilton, Kevin,
183
China:
information warfare and,
224
U.S. hacking of computer systems in,
227
â28,
229
U.S. relations with,
221
â28
China, cyber warfare by,
4
,
85
n,
198,
213
,
220
,
221
â28,
242
,
269
Google attack of,
234
intellectual property and trade secrets as targets of,
224
â27,
308
n
see also
People's Liberation Army
Christopher, Warren,
12
â13
“CIA Eavesdrops on Kremlin Chiefs” (Anderson),
288
n
â89
n
Citibank, Russian hackers' attack on,
42
civil liberties:
intelligence community and,
251
â52,
259
,
260
NSA and,
3
,
20
,
188
,
192
,
194
â96,
231
,
239
,
244
â52,
264
Protect America Act and,
194
â95
Civil War, U.S.,
4
Clapper, James,
231
â33