@War: The Rise of the Military-Internet Complex (44 page)

Read @War: The Rise of the Military-Internet Complex Online

Authors: Shane Harris

Tags: #Computers, #Non-Fiction, #Military, #History

BOOK: @War: The Rise of the Military-Internet Complex
9.15Mb size Format: txt, pdf, ePub

Mandia, Kevin,
[>]

Mandiant,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]

Mansoor, Ahmed,
[>]
–
[>]

marketing of safety,
[>]
–
[>]

McAfee,
[>]
,
[>]

McConnell, Mike: background,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; cyber warfare proposal to NSC,
[>]
–
[>]
,
[>]
; development of Cyber Command,
[>]
–
[>]
; as director of national intelligence,
[>]
,
[>]
–
[>]
; as director of NSA,
[>]
,
[>]
–
[>]
; national cyber defense plan,
[>]
–
[>]
,
[>]
,
[>]
; security briefing with Obama,
[>]
–
[>]
,
[>]

McRaven, Adm. Bill,
[>]
–
[>]

media,
[>]
,
[>]
,
[>]
–
[>]

medical data and facilities,
[>]
,
[>]
,
[>]
,
[>]

mercenaries,
[>]
–
[>]
,
[>]

Metadata Analysis Center (MAC),
[>]
–
[>]

Mexico,
[>]
–
[>]

Microsoft,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

Middle East,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]

military: command-and-control structure,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; communications monitoring,
[>]
–
[>]
; cyber espionage on members,
[>]
; cyber recruitment and training,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; rules of combat,
[>]
–
[>]
,
[>]
n.
[>]
.
See also
warfare

military-industrial complex,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

military-Internet complex,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

military networks: command-and-control structure, cyber,
[>]
–
[>]
,
[>]
; cyber breaches,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
n.
[>]
; mission to defend,
[>]
–
[>]
,
[>]
–
[>]
; weapons systems,
[>]
,
[>]
,
[>]
,
[>]

Miller, Charlie,
[>]

missile systems,
[>]

Monsegur, Hector Xavier,
[>]
–
[>]

Mubarak, Hosni,
[>]

Mueller, Robert,
[>]
,
[>]

Mullen, Adm. Mike,
[>]
–
[>]
,
[>]

 

Napolitano, Janet,
[>]
,
[>]

National Aeronautics and Space Administration (NASA),
[>]
–
[>]

National Institute of Standards and Technology (NIST),
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]

National Park Service,
[>]

National Reconnaissance Office,
[>]
,
[>]

National Security Agency (NSA): alliance with private sector,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
(
see also
Defense Industrial Base; Prism data collection); alliance with the FBI,
[>]
–
[>]
,
[>]
; anti-Tor campaign,
[>]
–
[>]
; Commander's Action Group,
[>]
–
[>]
; communications monitoring by (
see
National Security Agency, communications monitoring); Computer Network Operations,
[>]
; creation,
[>]
,
[>]
–
[>]
; Cyber Center,
[>]
; data collection and management,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; development of sabotage capability,
[>]
(
see also
al-Qaeda); distrust of,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; Fort Meade headquarters,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; Google retaliation,
[>]
–
[>]
,
[>]
; hunt team,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; insertion of vulnerabilities by,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; leak by Snowden (
see
Snowden, Edward); military cyber breach,
[>]
–
[>]
,
[>]
; National Cyber Investigative Joint Task Force,
[>]
; National Security Operations Center,
[>]
; national cyber defense plan (
see
National Security Agency, national cyber defense activities); natural gas system cyber breach,
[>]
; network forensics,
[>]
; 9/11 and the executive order,
[>]
–
[>]
; Office of General Counsel,
[>]
,
[>]
; PDD-
[>]
plans,
[>]
,
[>]
n.
[>]
; personnel deployed to war,
[>]
; personnel working on cyber defense,
[>]
; privacy issues,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
(
see also
National Security Agency, distrust of); Product Line,
[>]
–
[>]
; Signals Intelligence Directorate,
[>]
,
[>]
,
[>]
,
[>]
; Special Collection Service,
[>]
–
[>]
; Special Source Operations,
[>]
–
[>]
,
[>]
–
[>]
; Starburst/Stellar program,
[>]
; System and Network Interdisciplinary Program,
[>]
; TAO unit (
see
Tailored Access Operations); threat signature compilation,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
(
see also
Defense Industrial Base); track-the-hacker programs,
[>]
–
[>]
; trainees,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; Tranche 2 plan,
[>]
–
[>]
,
[>]
; Transgression Branch,
[>]
; war games,
[>]
–
[>]
; zero day exploit stockpiling,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

National Security Agency (NSA), communications monitoring: Afghanistan,
[>]
,
[>]
–
[>]
; Chinese university,
[>]
–
[>]
; code words used by,
[>]
,
[>]
n.
[>]
; contact chaining/call chains,
[>]
,
[>]
,
[>]
–
[>]
; domestic,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; global,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; Iraq,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; legal issues (
see
under
legal issues); Libya,
[>]
; Mexico,
[>]
–
[>]
; Pakistan,
[>]
; Real Time Regional Gateway,
[>]
–
[>]
; Syria,
[>]
; tapping,
[>]
,
[>]
,
[>]
,
[>]
; Tutelage scanning system,
[>]

National Security Agency (NSA), national cyber defense activities: bid for position of authority,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; early coordination,
[>]
–
[>]
,
[>]
; loss of authority,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; and Obama,
[>]
,
[>]
–
[>]
; proposal to Bush,
[>]
–
[>]
,
[>]
,
[>]

National Security Council (NSC),
[>]
–
[>]
,
[>]

NATO,
[>]
,
[>]
,
[>]
,
[>]

natural gas systems,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]

Navy SEALs,
[>]
,
[>]

NetWitness software,
[>]

network forensics,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

Neuberger, Anne,
[>]

New York Times
,
[>]
–
[>]

NexGen,
[>]
–
[>]

Next Generation Cyber Initiative,
[>]

Nieto, Enrique Peña,
[>]

9/11 attacks,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

NIST.
See
National Institute of Standards and Technology

North Africa,
[>]
–
[>]
,
[>]

North Korea,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Northrop Grumman,
[>]
,
[>]
,
[>]
,
[>]

NSA.
See
National Security Agency

NSC.
See
National Security Council

nuclear facilities,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
.
See also
Stuxnet program

 

Obama, Barack: China relations,
[>]
,
[>]
–
[>]
; critical infrastructure executive orders,
[>]
–
[>]
,
[>]
,
[>]
; cyber security as a top priority,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
; homeland security executive order,
[>]
; and the Mandiant report,
[>]
–
[>]
,
[>]
–
[>]
; and the NSA,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; PDD-
[>]
presidential directive,
[>]
,
[>]
n.
[>]
; security briefing with McConnell,
[>]
–
[>]
,
[>]

Obelisk,
[>]
,
[>]

Office of the Director of National Intelligence,
[>]
,
[>]
,
[>]

operations, cyber warfare: black bag jobs,
[>]
,
[>]
,
[>]
; Buckshot Yankee,
[>]
–
[>]
,
[>]
; Flatliquid,
[>]
–
[>]
,
[>]
n.
[>]
; Freedomnet,
[>]
; Ironavenger,
[>]
; natural gas system investigation,
[>]
–
[>]
,
[>]
; Operation Aurora (
see
China, cyber campaign against the US); Operation b54,
[>]
,
[>]
; Operation Byzantine Foothold,
[>]
; Shifting Shadow,
[>]
–
[>]
; Stuxnet,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; Tranche 2 plan,
[>]
–
[>]
,
[>]
; Turbulence program,
[>]

Outlook e-mail,
[>]
,
[>]

 

Packeteer software,
[>]

Pakistan,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

Palantir Technologies,
[>]
,
[>]

Other books

The Emperor of Any Place by Tim Wynne-Jones
The Fight for Us by Elizabeth Finn
Hitler's Last Days by Bill O'Reilly
Clean Sweep by Andrews, Ilona
The Dragons 3 by Colin Thompson
Back for Seconds by Ginger Voight