Authors: Fred Kaplan
shortcomings of,
177
,
186
,
280
,
281
Hoover, J. Edgar,
251
â52
HowlerMonkey,
136
Hussein, Saddam,
21
,
22
â23,
25
,
74
,
110
,
132
,
143
,
145
,
241
IBM Selectric typewriters,
16
Idaho National Laboratory,
167
,
204
Information Assurance Directorate (NSA),
18
,
34
,
66
,
68
,
92
â93,
128
,
133
,
181
,
201
,
234
,
257
,
260
,
276
,
293
n
Information Operations Center (IOC),
113
,
134
,
161
Information Operations Technology Center (IOTC),
124
â26
information security,
see
cyber security
“Information Security: Computer Attacks at Department of Defense Pose Increasing Risks” (GAO report),
47
Information Security Directorate (NSA),
177
Information Sharing and Analysis Centers (ISACs),
97
,
104
,
139
,
176
,
274
“Information Terrorism: Can You Trust Your Toaster?” (Devost),
273
information warfare,
41
,
58
,
119
,
161
,
169
,
208
,
289
n
and anti-Milosevic campaign,
112
â18
China and,
224
command-control systems and,
see
counter command-control (counter-C2) warfare
and hunt for Serbian war criminals,
110
â12
McConnell's focus on,
31
â32,
34
â37
U.S. offensive operations in,
108
â10;
see also specific operations
see also
cyber attacks, cyber warfare
infrastructure,
67
computer networks and,
41
,
45
,
52
â55
cyber attacks on,
166
â69,
174
,
198
,
212
,
214
,
215
as cyber attack targets,
104
,
212
cyber security and,
186
â89,
278
,
280
â84
Gates-Napolitano plan for protection of,
186
â89
as targets of terrorist attacks,
39
,
41
,
42
,
53
Infrastructure Protection Task Force:
Moonlight Maze investigation of,
86
Solar Sunrise investigation of,
74
â75
Inglis, John C. “Chris,” 244â48,
252
,
279
Inman, Bobby Ray,
21
â22,
84
,
128
,
132
as CIA deputy director,
27
as naval intelligence director,
14
,
26
â27,
28
as NSA director,
12
â13,
14
,
17
,
18
â19,
27
,
29
,
133
in retirement from government service,
27
â28
Institute for Advanced Studies (Princeton),
8
intelligence agencies:
civil liberties and,
251
â52,
259
,
260
lack of communication between,
171
public-private revolving door in,
172
International Atomic Energy Agency,
301
n
Internet,
47
,
58
,
100
,
164
,
181
,
188
,
193
,
207
,
212
commercial encryption on,
35
cyber security and,
52
â53
data packets on,
5
â6,
131
,
156
,
157
â58
discontinued NSA metadata program for,
253
domain name system of,
191
Estonia and,
162
â63
North Korea disconnected from,
271
â72
terrorism and,
35
vulnerability of,
93
â94,
176
â77
see also
computer networks; World Wide Web
Internet Security Systems,
80
Interview, The
(film),
269
intrusion-detection systems (IDS),
80
,
81
,
101
,
120
,
176
,
177
,
278
,
281
Iran:
attack on,
see
Stuxnet
cyber attack on Las Vegas Sands by,
265
â68
cyber warfare and,
4
,
213
,
265
â68
nuclear weapons program of,
198
,
201
,
203
â4,
212
Saudi Aramco attacked by,
213
,
216
Shamoon computer virus developed by,
213
Iranian National Oil Company,
213
Iraq:
command-control network of,
22
insurgency in,
143
,
147
,
150
,
156
,
173
,
180
,
208
,
216
,
241
Kurds in,
160
lack of U.S. intelligence about,
22
NSA teams in,
159
â60
Operation Desert Storm,
21
â23,
29
,
32
,
74
,
149
,
151
Sunni-Shiite conflict in,
147
,
160
U.S. invasion of,
142
â43,
145
,
147
,
240
WMD inspectors expelled by,
74
Islam, Sunni-Shiite split in,
147
,
160
Israel,
216
Iranian nuclear program and,
203
â4
Stuxnet and,
207
Syrian reactor bombed by,
160
â61,
198
anti-Milosevic campaign of,
114
â18,
119
and 1999 Balkans bombing campaign,
112
â14,
119
,
161
Jeep Cherokee, hacking of,
273
n
â74
n
Johnson, Jeh,
270
Joint Chiefs of Staff,
32
,
74
,
146
,
183
Information Operations Response Cell of,
76
,
78
intelligence directorate (J-2) of,
22
,
69
J-39 bureau of,
see
J-39
Joint Computer Conference,
8
Joint Intelligence Center,
22
â23,
24
,
29
,
32
,
132
Joint Special Operations Command (JSOC),
150
,
151
â52,
156
Joint Task Force-Computer Network Defense (JTF-CND),
81
â82,
83
â84,
88
,
105
,
120
â21,
183
,
187
,
276
,
296
n
Joint Task Force-Computer Network Operations (JTF-CNO),
122
,
136
bureaucratic obstructions to,
146
â47
Joint Task Force-Global Network Operations,
183
Justice Department, U.S.,
63
,
155
cyber crime and,
41
â42
Information Infrastructure Task Force Coordinating Committee of,
42
Infrastructure Protection Task Force of,
see
Infrastructure Protection Task Force
Section 215 case and,
262
Kaspersky Lab,
210
Kelly Air Force Base,
see
Air Force Information Warfare Center
Khamenei, Ayatollah Ali,
266
Kim Jong-un,
269
Kingsley, Ben,
31
Kuwait,
21
Kuwait City,
22
L0phtCrack,
92
Lacombe, Phillip,
52
â53
Lake, Anthony,
40
Lane, Charles,
44
Langley, Va.,
6
Lasker, Lawrence,
9
â10,
32
,
287
n
Las Vegas Sands Corporation, cyber attack on,
265
â68
Law of Armed Conflict,
25
Lawrence Berkeley National Laboratory,
61
â62
Lawrence Livermore National Laboratory,
62
Levitt, Karl,
62
Liberty and Security in a Changing World
(Review Group report),
255
,
258
â59,
285
Lieberman, Joe,
95
Lockheed Martin,
120
Chinese cyber attack on,
224
â25
LoudAuto,
136
Lukasik, Stephen,
9
Lute, Jane Holl,
188
,
189
,
302
n
â3
n
McAfee, Chinese cyber attacks tracked by,
226
McCarthy, John,
97
as JSOC commander,
150
,
151
â52
McConnell, John “Mike,” 57,
169
,
183
,
194
,
248
Bush briefed on cyber warfare by,
173
â75,
187
Clipper Chip and,
36
â37,
40
,
58
,
128
CNCI plan of,
177
â78,
198
â99,
278
Cyber Command proposed by,
185
cyber deterrence and,
278
cyber security as priority of,
172
,
198
,
278
as director of national intelligence,
171
â78,
191
â92,
216
FISA and,
192
â93
information warfare as priority of,
31
â32,
34
â37
as Joint Intelligence Center head,
22
â23,
29
as NSA director,
29
,
30
â37,
128
,
133
,
172
,
173
,
193
Obama's replacing of,
200
in pre-election briefing of Obama,
197
â98
Sneakers
as epiphany for,
33
McDermott, Thomas,
68
McDonough, Denis,
238
McVeigh, Timothy,
39
MAE East,
191
n
MAE West,
191
n
Makaveli (pseudonym),
77
â78
Maliki, Nouri al-,
160
malware,
182
,
205
â6,
207
â8,
266
Mandia, Kevin,
85
,
87
,
223
,
225
,
269
,
292
n
â93
n
Mandiant,
85
n,
222â23,
225
,
226
,
269
,
292
n
Marine Corps, Computer Network Defense unit of,
123
Marsh, Robert T. “Tom,” 50,
51
,
52
,
72
Marshall, Richard H. L.,
24
â25,
68
Marsh Commission,
98
â99
Marsh Report (
Critical Foundations
),
53
â55,
72
,
80
,
89
,
94
,
100
,
139
,
142
,
166
,
199
,
241
Mellon, Christopher,
35
Merkel, Angela, NSA hacking of,
235
,
260
Alexander and,
230
,
231
,
233
,
253
,
256
FISA Court and,
245
,
246
,
253
,
256
,
261
,
262
,
263
NSA's collection and storage of,
64
,
194
â97,
230
â35,
238
,
245
â47,
252
â54,
261
â62,
263
Obama “white paper” on,
238