Authors: Fred Kaplan
Chinese cyber attacks on,
224
â25
hacking of,
41
Defense Department, U.S.,
6
,
18
,
54
,
67
,
100
,
257
Advanced Research Projects Agency (ARPA),
7
Critical Infrastructure Commission and,
49
cyber attacks on,
47
in Eligible Receiver,
see
Eligible Receiver 97 cyber attack exercise
hacking and,
41
infrastructure policy directorate of,
43
â44
Internet connections to,
280
Microwave, Space and Mobile Systems office of,
19
Moonlight Maze cyber attack on,
78
â79,
81
â88,
119
,
123
,
212
â13,
223
National Communications System of,
177
Solar Sunrise attack on,
74
â78,
80
,
81
,
101
,
119
,
120
,
123
Special Technological Operations Division of,
7
Strategic Leveraging Project of,
43
Defense Information Systems Agency (DISA),
65
,
74
,
75
,
78
,
80
,
82
Defense Intelligence Agency,
57
Defense Science Board:
cyber deterrence task force of,
279
cyber security report of,
275
â79
“Information Warfare-Defense” task force of,
54
demon-dialing,
9
â10,
59
,
64
,
112
,
113
,
161
denial-of-service attacks,
102
â3,
162
â63,
213
,
216
Department of Defense Cyber Strategy, The
(Carter),
283
,
316
n
â17
n
Depression, Great,
199
Desert Storm, Operation,
21
â25,
29
,
32
,
74
,
132
â33,
149
,
290
n
civilian casualties in,
24
â25
deterrence:
in cyber warfare,
see
cyber deterrence
Deutch, John,
49
Devost, Matt,
65
,
66
,
80
â81,
273
,
293
n
digital communications:
data packets in,
5
â6,
17
â18,
131
,
156
,
192
â93,
194
,
248
,
249
â50
GCHQ's collection of data from,
228
â29
global switch from analog to,
25
,
28
â29,
30
,
35
,
126
â27,
275
â76
metadata in,
see
metadata
NSA's collection of data from,
196
â97,
228
â29,
230
â35,
237
â64
PRISM and,
247
â52
U.S. as hub of,
191
â92,
193
,
248
see also
telecom companies
Asia Society speech of,
221
â22,
226
â27
Earnest, Josh,
272
n
East Germany,
235
eBay,
102
e-commerce,
102
Einstein (IDS project),
177
,
179
elections, U.S.:
Electromagnetic Systems Laboratory,
see
ESL, Inc.
electronic counter measures,
14
â15
Eligible Receiver 97 cyber attack exercise,
55
,
57
â58,
65
â72,
75
,
81
,
90
,
110
,
119
,
241
,
275
Army's refusal to participate in,
70
hacking of military communication and computer networks in,
57
,
67
,
68
â69
NSA Red Team in,
57
,
66
,
67
â68,
69
â71,
72
,
76
,
80
,
182
postmortem briefing on,
70
â71
Ellis, James,
117
Energy Department, U.S.,
166
cyber security as low priority of,
172
â73
espionage,
138
â39
microwave technology and,
12
â13,
16
â17,
22
,
132
â33,
289
n
Estonia, cyber attack on,
162
â64,
165
,
241
European Command, U.S.,
19
Executive Order 13010,
47
,
48
â49,
74
F-35 Joint Strike Fighter aircraft,
224
â25
Facebook, PRISM and,
247
Federal Bureau of Investigation (FBI),
63
,
74
,
77
â78,
98
,
269
,
288
n
National Infrastructure Protection Center of,
166
National Security Letters of,
254
â55,
256
,
260
Review Group briefings by,
254
â55
Review Group recommendations for,
256
Federal Intrusion Detection Network (FIDNET),
100
â102
Federal Trade Commission, North Korean cyber attack on,
213
fiber-optic cables,
132
â33
global spread of,
30
â31
FIDNET (Federal Intrusion Detection Network),
100
â102
FireEye,
269
1st Armored Division,
149
FISA Court,
155
,
192
,
194
,
195
,
196
,
197
,
238
,
244
metadata collection and,
245
,
246
,
253
,
256
,
261
,
262
,
263
Review Group's recommendations for,
256
â57
secrecy of,
233
five eyes (U.S., Great Britain, Canada, Australia, New Zealand):
command-control systems hacking exercises of,
65
â66,
235
intelligence sharing by,
65
Flame computer virus,
205
â6,
213
Ford Escape, hacking of,
273
n
Foreign Assistance Act,
96
Foreign Intelligence Surveillance Act (1978),
196
â97
Foreign Intelligence Surveillance Court,
see
FISA Court
Franco, James,
269
Freeh, Louis,
96
Gandy, Charles,
16
Gates, Robert,
4
,
171
,
174
,
271
,
304
n
â5
n,
317
n
cyber warfare as concern of,
272
â73
“dark territory” metaphor of,
272
as defense secretary,
173
,
184
â89,
204
,
209
,
214
infrastructure security and,
280
Obama's replacing of,
220
and plan for protection of civilian infrastructure,
186
â89
Stuxnet and,
206
GEDA (Gain, Exploit, Defend, Attack) concept,
123
Gellman, Barton,
229
General Accounting Office,
47
General Services Administration,
97
Georgia, Republic of:
Russian invasion of,
164
â66
Giambastiani, Edmund,
174
Gibson, William,
45
â46
“Global Access Study” (NSA paper),
28
â29,
30
Golan Heights,
161
Good Harbor,
241
Google:
Chinese cyber attack on,
234
PRISM and,
247
Gorelick, Jamie,
40
â41,
45
,
46
,
48
,
50
,
51
cyber crime and,
41
â42
Government Communications Headquarters (GCHQ), British,
116
â17,
213
communications data collected by,
228
Gravell, William,
291
n
Great Britain,
235
see also
five eyes
Great Depression,
199
Greenwald, Glenn,
229
Grenada, U.S. invasion of,
145
Growing Vulnerability of the Public Switched Networks
(National Research Council),
54
GRU,
84
Guardian,
228,
229
“Guardians of Peace,” 268
Gulf War,
see
Desert Storm, Operation
Gunman (Soviet spy device),
16
hacking, hackers,
5
,
8
,
33
,
41
,
47
,
123
,
136
,
227
â28,
229
,
235
L0pht and,
90
â91
of military sites,
42
Network Security Monitoring and,
60
â61
of Social Security numbers and personal data,
265
,
268
software patches and,
136
â37
university computers as entry points for,
61
,
73
,
82
white-hat,
163
zero-day vulnerabilities and,
137
see also
cyber attacks, cyber warfare
Hadley, Stephen,
174
Haiti, planned U.S. invasion of,
58
â59,
64
,
107
â8,
112
,
161
Hamre, John,
71
,
74
,
77
â78,
80
,
81
,
86
,
113
,
120
,
121
,
122
,
125
,
153
â54,
183
,
296
n
Clarke and,
95
â96
Hanscom Air Force Base,
50
â51
Hathaway, Melissa,
176
â77,
279
CNCI plan of,
177
â78,
198
â99
Cyberspace Policy Review
issued by,
199
â200
as Air Force Information Warfare Center commander,
122
â23,
126
Alexander's conflicts with,
152
â53,
154
â55
as CIA director,
215
CNE and,
138
“Director's Work Plan for Change” of,
128
â29
GEDA concept of,
123
as NSA director,
122
,
125
â26,
127
â33,
135
,
138
,
151
,
157
â59
TAO and,
135
Trailblazer and,
132
Heath, James,
154
Hiroshima, atomic bombing of,
215
Homeland Security Department, U.S.,
18
,
142
,
167
,
179
CNCI and,
178
North Korean cyber attack on,
213
and protection of civilian infrastructure,
186