@War: The Rise of the Military-Internet Complex (43 page)

Read @War: The Rise of the Military-Internet Complex Online

Authors: Shane Harris

Tags: #Computers, #Non-Fiction, #Military, #History

BOOK: @War: The Rise of the Military-Internet Complex
13.73Mb size Format: txt, pdf, ePub

Federal Bureau of Investigation (FBI),
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]

fiber-optic trunk lines,
[>]
,
[>]
,
[>]

Fick, Nathaniel,
[>]
–
[>]

fifth domain, cyberspace as the,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

file-sharing networks,
[>]
–
[>]

financial and banking data systems: clearinghouse network,
[>]
; cyber breaches,
[>]
–
[>]
,
[>]
–
[>]
; cyber security,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; denial-of-service attacks,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; hack-back against Citadel,
[>]
–
[>]
; risks of malware use in military context,
[>]
–
[>]
,
[>]
.
See also
critical infrastructures

FinFisher software,
[>]
–
[>]
,
[>]

FireEye,
[>]
,
[>]

Firefox,
[>]

First Amendment,
[>]

FISA.
See
Foreign Intelligence Surveillance Act

Flatliquid operation,
[>]
–
[>]
,
[>]
n.
[>]

Foreign Intelligence Surveillance Act (FISA),
[>]
,
[>]
–
[>]
,
[>]

Foreign Intelligence Surveillance Court,
[>]
,
[>]
–
[>]
,
[>]

foreign policy, US: for China,
[>]
–
[>]
,
[>]
–
[>]
; international cyber agreements,
[>]
,
[>]
; and monitoring of foreigners,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]

forensics, network,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

Fourth Amendment,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

France,
[>]
–
[>]
,
[>]
–
[>]
,
[>]

F-35.
See
Joint Strike Fighter

future innovations in cyber security,
[>]
–
[>]

future scenario for cyberspace,
[>]
–
[>]

fuzzing,
[>]
–
[>]

 

Gates, Robert,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

gateways,
[>]
,
[>]

Google: alliance with NSA,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
; China market,
[>]
; cyber security,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
; distributed computing,
[>]
; Gmail,
[>]
,
[>]
,
[>]
,
[>]
; NSA's secret monitoring of,
[>]
,
[>]
; retaliation against China,
[>]
–
[>]
,
[>]
,
[>]
n.
[>]
; telecommunications networks,
[>]
; user statistics,
[>]

gray market,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

 

hack-backs,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

hackers: anonymity,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; catching (
see
hackers, catching); conferences,
[>]
,
[>]
,
[>]
,
[>]
; freelance,
[>]
,
[>]
–
[>]
; groups (
see
Anonymous; LulzSec); hacktivists,
[>]
,
[>]
; mercenaries,
[>]
–
[>]
,
[>]
; within the NSA (
see
Tailored Access Operations); as pirates/privateers,
[>]
; retaliation against (
see
hack-backs; private sector, retaliation by); trained for US cyber warfare,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
; “white hat” and “black hat,”
[>]
,
[>]

hackers, catching: bounty system,
[>]
; FBI activities,
[>]
–
[>]
; honeypots,
[>]
,
[>]
,
[>]
,
[>]
; imposter server,
[>]
; network forensics,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
; private companies as bait,
[>]
–
[>]
,
[>]
,
[>]
–
[>]

Hacking Team,
[>]
–
[>]

Hammond, Jeremy,
[>]
–
[>]
,
[>]

Harris Corporation,
[>]

Hayden, Lt. Gen. Michael,
[>]
–
[>]
,
[>]
,
[>]

honeypot,
[>]
,
[>]
,
[>]
,
[>]

Hu, Jintao,
[>]

Huawei,
[>]

Hunton Williams,
[>]
.
See also
Team Themis

Hutchins, Eric,
[>]
,
[>]
–
[>]

 

IBM,
[>]
,
[>]
,
[>]

iDefense,
[>]

India,
[>]

informants,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

Information Operations Center (IOC),
[>]

Information Operations Command,
[>]

In-Q-Tel,
[>]
,
[>]

intellectual property, cyber theft: by China,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
n.
[>]
(
see also
private sector, retaliation); of Google,
[>]
–
[>]
,
[>]
n.
[>]
; of Target,
[>]
,
[>]

Internet: anonymity,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; anticensorship projects,
[>]
,
[>]
; as a battlefield,
[>]
–
[>]
,
[>]
; domain issues,
[>]
,
[>]
; gateways,
[>]
,
[>]
; illegal activities (
see
cybercrime); inherent vulnerability in access to,
[>]
,
[>]
,
[>]
; invention,
[>]
; military-Internet complex,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

Internet browsers,
[>]

Internet cafes,
[>]
–
[>]
,
[>]

Internet protocol addresses: compilation (
see
Defense Industrial Base; Prism data collection); hiding (
see
Internet, anonymity); private companies that provide (
see
mercenaries); security,
[>]
,
[>]
,
[>]
,
[>]

Internet Security Systems,
[>]

Internet service providers: during bank cyber breach,
[>]
,
[>]
; CIA installation of spyware,
[>]
; concerns working with US government,
[>]
,
[>]
,
[>]
–
[>]
; and the NSA,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; as Tier
[>]
,
[>]

IOC.
See
Information Operations Center

Iran,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
.
See also
Stuxnet program

Iraq,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

Ironavenger operation,
[>]

Israel,
[>]
,
[>]

Italy,
[>]
–
[>]

Izz ad-Din al-Qassam Brigades,
[>]
,
[>]

 

Johnson & Johnson,
[>]

Joint Chiefs of Staff,
[>]
,
[>]
–
[>]
,
[>]

Joint Special Operations Command (JSOC),
[>]
,
[>]
,
[>]
–
[>]
,
[>]

Joint Strike Fighter (F-35),
[>]
–
[>]
,
[>]
,
[>]
,
[>]

 

keystroke monitoring,
[>]
,
[>]
,
[>]
,
[>]

kill chain,
[>]
.
See also
cyber kill chain

kill switch provision,
[>]

Kleiner Perkins Caufield & Byers,
[>]

Kosovo War,
[>]

Kuwait,
[>]

 

LabMD,
[>]

law enforcement: city police,
[>]
; Europol,
[>]
; “law enforcement sensitive” data,
[>]
,
[>]
; prosecution,
[>]
,
[>]
.
See also
Federal Bureau of Investigation

leads, within communications metadata,
[>]

legal issues: bin Laden mission,
[>]
–
[>]
; cyber warfare with Iran,
[>]
; hacker used by government for illegal activities,
[>]
; information sharing,
[>]
; international laws less stringent,
[>]
,
[>]
,
[>]
,
[>]
; lawsuit against Stratfor,
[>]
; liability concerns,
[>]
,
[>]
; no international body/treaty in cyber warfare,
[>]
,
[>]
; of NSA communication monitoring (
see
legal issues, monitoring by the NSA); patent rights,
[>]
; retaliation (
see
legal issues, private sector retaliation); US law for covert operations vs. international law for military operations,
[>]

legal issues, monitoring by the NSA: attacking Tor nodes,
[>]
; of banks,
[>]
; contact chaining,
[>]
,
[>]
,
[>]
; under FISA,
[>]
,
[>]
–
[>]
; foreign/of foreigners,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
; RTRG,
[>]
–
[>]
; of individuals vs. groups of people,
[>]
–
[>]
; tapping,
[>]
,
[>]
,
[>]

legal issues, private sector retaliation: by Google,
[>]
–
[>]
,
[>]
–
[>]
; government action campaign,
[>]
; as illegal,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; legal permission,
[>]
,
[>]
,
[>]
,
[>]

legal rulings.
See
Foreign Intelligence Surveillance Court; US Department of Justice; US Supreme Court

Libya,
[>]

listening posts,
[>]

Lockheed Martin,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

log-in.
See
password security

LulzSec,
[>]
,
[>]

Lute, Jane Holl,
[>]
–
[>]

 

MAC.
See
Metadata Analysis Center

Magic Lantern software,
[>]
,
[>]
–
[>]

malware: e-mail as vehicle for,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
(
see also
e-mail, posing as legitimate); identification of targets (
see
spear-phishing); infiltration of al-Qaeda,
[>]
,
[>]
; installation strategies,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; kill switch to prevent,
[>]
; returned to hacker,
[>]
; reverse engineering of,
[>]
; used by the CIA,
[>]
,
[>]

Other books

The Orchardist by Amanda Coplin
His Vampyrrhic Bride by Simon Clark
Twist by William D. Hicks
The Last Book in the Universe by Rodman Philbrick
Lies of the Heart by Laurie Leclair
Margarette (Violet) by Johi Jenkins, K LeMaire
Sloe Ride by Rhys Ford
Prodigal Son by Debra Mullins
It's Not Luck by Eliyahu M. Goldratt