Authors: Fred Kaplan
critical infrastructure hearings of,
47
â48
Obama, Barack,
186
,
187
,
197
â98,
201
,
249
,
259
,
304
n
â5
n
Bush's Stuxnet briefing of,
203
Chinese cyber attacks and,
221
â28,
235
and cyber attack on Sony,
270
â71
cyber security as priority of,
200
â201
drone strikes supported by,
208
“Improving Critical Infrastructure Cybersecurity” executive order of,
274
intelligence review panel appointed by,
see
President's Review Group on Intelligence and Communication Technologies
PPD-20 of,
217
â20,
228
,
314
n
â15
n
Stuxnet and,
203
,
208
â9,
210
,
212
terrorism as priority of,
197
â98
Xi's summits with,
228
â29,
308
n
Obama administration:
cyber warfare and,
3
â4
metadata “white paper” of,
238
Office of Technology Assessment, U.S.,
43
Oklahoma City bombing,
39
,
40
,
89
,
175
Olympic Games, Operation,
see
Stuxnet
Orchard, Operation,
161
Pace, Peter,
211
Pacific Gas & Electric,
52
â53
Pakistan, U.S. drone strikes in,
201
,
208
Paladin Capital Group,
233
Paltalk, PRISM and,
247
Panetta, Leon, as defense secretary,
220
Patriot Act (2001),
192
Section 215 of,
245
â46,
252
â53,
261
â63
Section 505 of,
254
sunset clause in,
261
â63
PDD-39 (“U.S. Policy on Counterterrorism”),
39
â40,
46
,
89
PDD-63,
see
“Critical Infrastructure Protection” (PDD-63)
People's Liberation Army, Unit 61398 of,
222
â23,
225
,
226
,
242
,
269
Perry, William,
14
â15,
67
,
76
,
124
,
184
,
220
as secretary of defense,
57
â58,
59
,
66
â67,
120
Persian Gulf,
74
Petraeus, David,
158
â59,
160
,
173
phishing,
136
Physical Vulnerability of Electric Systems to Natural Disasters and Sabotage
(U.S. Office of Technology Assessment),
43
â44
PlayStation network, hacking of,
268
Poitras, Laura,
229
Polaris missile,
120
Pollard, Neal,
75
Power, Samantha,
239
PPD-20 (“U.S. Cyber Operations Policy”),
217
â20,
228
,
314
n
â15
n
President Reagan: The Role of a Lifetime
(Cannon),
287
n
â88
n
President's Commission on Critical Infrastructure Protection,
49
â55,
74
Marsh as chairman of,
50
members of,
49
â50
Minihan's Eligible Receiver briefing to,
72
report of,
see
Marsh Report (
Critical Foundations
)
President's Review Group on Intelligence and Communication Technologies (Review Group),
235
,
238
â40,
242
â60,
264
cyber security prioritized by,
257
â58
deadline of,
242
FBI's briefings of,
254
â55
NSA metadata collecting examined by,
245
â47,
252
â54,
262
and potential for abuse by intelligence agencies,
251
â52,
259
,
260
PRISM and,
247
â48
public trust as priority of,
237
â38,
258
report of,
see Liberty and Security in a Changing World
programmable logic controllers (PLCs),
204
â5
Protect America Act (2007),
193
â95
civil liberties and,
194
â95
Section 702 of,
248
â49
Putin, Vladimir,
162
RageMaster,
136
RAND Corporation,
8
,
10
,
51
,
278
,
316
n
RATs (Remote Access Trojans),
225
â26
Rattray, Gregory,
225
RCA,
19
Reagan, Ronald,
7
,
19
,
27
,
67
,
72
,
183
,
287
n
counter-C2 warfare and,
15
â16
Executive Order 12333 of,
288
n
NSDD-145 of,
2
â3,
7
,
19
â20,
27
,
34
,
54
,
67
,
72
,
100
,
188
,
195
,
241
“Star Wars” program and,
2
Reagan administration,
54
Redford, Robert,
31
regulation, corporate fear of,
98
â99,
101
,
176
,
200
,
274
â75
Remote Access Trojans (RATs),
225
â26
Reno, Janet,
39
â40
resilience, as goal of cyber security,
277
Review Group,
see
President's Review Group on Intelligence and Communication Technologies
Rhoads, Walter “Dusty,” 107â8,
120
,
121
Rice, Condoleezza,
140
â41,
150
,
174
Riedel, Bruce,
199
Ronfeldt, David,
291
n
RTRG (Real Time Regional Gateway),
158
â60,
195
Rumsfeld, Donald,
150
â51,
155
,
173
Iraq insurgency downplayed by,
148
,
150
Russian Federation:
CentCom hacking and,
182
and cyber attack on Georgia,
164
â66
cyber attacks by,
4
,
42
,
164
â66,
224
Estonian cyber attack and,
163
â64,
165
Georgia invaded by,
164
â66
Moonlight Maze and,
86
â88,
213
,
223
Sandia Laboratories,
111
Sare, Michael,
71
Saudi Aramco, Iranian cyber attack on,
213
,
216
SCADA (Supervisory Control and Data Acquisition) systems,
45
Schaeffer, Richard,
181
â82,
276
Schell, Roger,
293
n
Schmidt, Howard,
188
Schoomaker, Peter,
150
â51
Science Applications International Corporation (SAIC),
132
Scowcroft, Brent,
44
2nd Circuit Court of Appeals, U.S., Section 215 ruling of,
262
â63
Secret Service, North Korean cyber attack on,
213
“Security and Privacy in Computer Systems” (Ware),
8
â9
Senate, U.S.:
Armed Services Committee of,
46
,
71
,
283
Church Committee of,
37
,
230
,
252
Foreign Relations Committee of,
197
Governmental Affairs Committee of,
48
,
94
Intelligence Committee of,
35
â36
Select Committee on Intelligence of,
126
,
127
,
231
â33,
256
sensitive compartmented information facilities (SCIFs),
243
September 11, 2001, terrorist attacks,
3
,
140
â41,
155
,
171
,
174
,
192
,
195
,
241
,
244
,
261
Serbia, U.S. hacking of phone systems in,
113
,
132
Shady RAT, Operation,
226
Shamoon computer virus,
213
â14
Siemens, logic controllers of,
204
â5,
206
,
211
Signal Security Agency,
11
609th Information Warfare Squadron,
7
,
108
â10,
120
60 Minutes
(TV program),
240
Skype, PRISM and,
247
Slocombe, Walter,
44
Snowden, Edward,
194
NSA programs leaked by,
63
â64,
228
â30,
231
,
234
,
242
,
244
,
245
,
251
,
257
â59,
262
,
282
,
285
,
298
n
Social Security,
99
Social Security numbers, hacking of,
265
,
268
Solar Sunrise cyber attack,
74
â78,
80
,
81
,
98
,
101
,
119
,
120
,
123
,
183
,
187
,
241
Sonic.net,
77
Sony Online Entertainment, hacking of,
268
Sony Pictures Entertainment, North Korean cyber attack on,
268
â71,
272
n
South China Morning Post,
229
South Korea, North Korean cyber attacks on,
213
,
269
collapse of,
162
Sputnik II,
119
Stabilization Force (SFOR),
110
â12
“Star Wars” program,
2
Stasi,
235
Stellar Wind,
155
n
Stimpy (pseudonym),
77
â78
Stimson, Henry,
11
Stone, Geoffrey:
civil liberties expertise of,
239
,
244
,
251
,
259
,
264
in Review Group,
239
,
244
,
246
,
250
â52,
253
,
254
,
264
Strategic Command, U.S.,
183
Studeman, William,
21
â22,
26
,
27
,
28
,
30
,
42
,
84
,
128
as acting CIA director,
45
as CIA deputy director,
41
information warfare as focus of,
41
as NSA director,
126
â27,
275
â76
Stuxnet,
201
,
213
,
216
,
217
,
218
â19,
228
,
242
,
304
n
â5
n
Bush and,
203
,
205
,
206
,
208
,
209
,
212
,
215
centrifuges speed manipulated by,
209