@War: The Rise of the Military-Internet Complex (42 page)

Read @War: The Rise of the Military-Internet Complex Online

Authors: Shane Harris

Tags: #Computers, #Non-Fiction, #Military, #History

BOOK: @War: The Rise of the Military-Internet Complex
2.27Mb size Format: txt, pdf, ePub

counterterrorism,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

crashes, computer,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]

credit/debit cards,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

critical infrastructures: cyber attacks, annual,
[>]
,
[>]
; cyber attack threat,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; declaration of war issues,
[>]
,
[>]
,
[>]
; definition,
[>]
,
[>]
,
[>]
–
[>]
; executive orders,
[>]
–
[>]
,
[>]
–
[>]
,
[>]

Croom, Charlie,
[>]
,
[>]
,
[>]
,
[>]

crowdsourcing,
[>]
,
[>]

CrowdStrike Services,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

cryptologists,
[>]
,
[>]
,
[>]
,
[>]

Cyber Command.
See
US Cyber Command

cybercrime,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
.
See also
intellectual property; network forensics

cyber espionage,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
.
See also
China, cyber campaign against the US; spyware

cyber espionage by the US: of Americans,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
(
see also
Fourth Amendment; legal issues, monitoring by the NSA; privacy issues); by companies (
see under
private sector); by the FBI,
[>]
–
[>]
; of foreigners,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; global telecommunications,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
(
see also
Tailored Access Operations); by Mandiant,
[>]
–
[>]
; propaganda,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; of individuals vs. groups of people,
[>]
–
[>]
; two reasons for,
[>]

cyber kill chain,
[>]
–
[>]

cyber security: companies (
see under
private sector); cyber hygiene,
[>]
; cyber sentry model,
[>]
; defense tactics,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
; enemy among us,
[>]
–
[>]
; federal guidelines,
[>]
; future innovations,
[>]
–
[>]
; log-in and password,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; as a national priority,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; patent rights,
[>]
; shift from counterterrorism to,
[>]
,
[>]
,
[>]
,
[>]
; standards development,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
; used in marketing,
[>]
–
[>]
.
See also
National Security Agency, national cyber defense activities

cyberspace: characteristics,
[>]
,
[>]
,
[>]
; as civilian space vs. militarized zone,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; as the fifth domain of warfare,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; future scenario for,
[>]
–
[>]
; as the new domain of warfare,
[>]
–
[>]
,
[>]
–
[>]
; US policy to dominate,
[>]
,
[>]
–
[>]
,
[>]

cyber warfare: authority to begin (
see
authority for cyber warfare); with China, effects on the US,
[>]
,
[>]
,
[>]
; collateral damage,
[>]
,
[>]
(
see also
critical infrastructures); cyber arms market,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; cyber arms race,
[>]
,
[>]
,
[>]
,
[>]
; defense plan, national,
[>]
–
[>]
; defense vs. offense,
[>]
–
[>]
,
[>]
–
[>]
(
see also
cyber warfare, blurred distinction between defense and offense); early development,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; enemy among us,
[>]
–
[>]
; the first cyber war,
[>]
–
[>]
; identification of targets,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
; Internet as a battlefield,
[>]
–
[>]
; international agreements,
[>]
,
[>]
; mercenaries,
[>]
–
[>]
,
[>]
; by private companies (
see
hack-backs; private sector, retaliation); privatization,
[>]
,
[>]
–
[>]
; recruitment/training,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; rules of combat,
[>]
–
[>]
,
[>]
n.
[>]
; tactics (
see
tactics); target data,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; three missions of,
[>]
–
[>]
,
[>]
–
[>]
; use of term,
[>]
,
[>]
–
[>]

cyber warfare, blurred distinction between defense and offense: “active defense,”
[>]
,
[>]
; “defense” easier to sell,
[>]
–
[>]
; need to combine capability,
[>]
,
[>]
–
[>]
; and NSA–Cyber Command relationship,
[>]
,
[>]
,
[>]
; by private companies,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; pure information vs. military operations,
[>]
,
[>]
; with zero day information,
[>]
–
[>]
,
[>]
–
[>]

 

data collection and storage: CIA-NSA metadata,
[>]
–
[>]
,
[>]
–
[>]
; cloud,
[>]
,
[>]
,
[>]
; hacker history by Lockheed,
[>]
; phone data by NSA,
[>]
; Prism system,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; targeting data,
[>]
,
[>]
,
[>]

Data Intercept Technology Unit (DITU),
[>]
,
[>]
–
[>]

data management,
[>]
,
[>]

data mining,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

Davis, Maj. Gen. John,
[>]
,
[>]
,
[>]
–
[>]

Def Con conference,
[>]
,
[>]
,
[>]

Defense Cyber Crime Center,
[>]

Defense Industrial Base (DIB): creation,
[>]
,
[>]
,
[>]
; and DHS,
[>]
; expansion,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; function,
[>]
–
[>]
; ISP test without NSA aid,
[>]
–
[>]
; Lockheed sharing data with,
[>]
; number of members,
[>]
–
[>]

Defense Information Systems Agency,
[>]
,
[>]
,
[>]

Defense Intelligence Agency,
[>]
,
[>]

denial-of-service attacks,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

DHS.
See
US Department of Homeland Security

DIB.
See
Defense Industrial Base

distributed computing vs. centralized supercomputers,
[>]
,
[>]

DITU.
See
Data Intercept Technology Unit

documents/information: classified,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; classified threat intelligence sharing,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; declassified,
[>]
,
[>]
; pdf,
[>]
–
[>]
; unclassified,
[>]
–
[>]
,
[>]
,
[>]

DOD.
See
US Department of Defense

drives, USB.
See
thumb drives

drone technology,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

 

Eastern Europe,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

eBay,
[>]

Egypt,
[>]

Eisenhower, Dwight,
[>]
,
[>]
,
[>]

electrical power systems,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
n.
[>]
.
See also
critical infrastructures

Electronic Privacy Information Center,
[>]

e-mail: BlackBerry,
[>]
; cyber breaches,
[>]
,
[>]
,
[>]
,
[>]
; FBI sting,
[>]
–
[>]
; of foreigners vs. Americans,
[>]
–
[>]
,
[>]
; Gmail,
[>]
,
[>]
,
[>]
,
[>]
; Hotmail,
[>]
; and the Iraq War,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; monitoring,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; Outlook,
[>]
,
[>]
,
[>]
; posing as legitimate,
[>]
,
[>]
,
[>]
,
[>]
(
see also
malware, e-mail as vehicle for; spear-phishing; spyware, vehicles for); security,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; strategies for anonymity,
[>]
,
[>]
,
[>]

embassies,
[>]
,
[>]
,
[>]
–
[>]

encryption,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

encryption key,
[>]
,
[>]

Endgame,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

energy resources.
See
electrical power systems; nuclear facilities; petroleum power systems

engineering, reverse,
[>]

England, Gordon,
[>]

Estonia,
[>]

ethical issues: cyber offense by private companies,
[>]
; how sold information is used,
[>]
,
[>]
; placement of blame for zero day attack,
[>]
; responsibility to disclose vulnerabilities,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]

 

Facebook,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Other books

The Unknown Mr. Brown by Sara Seale
Midwife in the Family Way by Fiona McArthur
The House of Sleep by Jonathan Coe
Learning to Live by Cole, R.D.
All the Little Liars by Charlaine Harris
Up From the Blue by Susan Henderson