Read @War: The Rise of the Military-Internet Complex Online

Authors: Shane Harris

Tags: #Computers, #Non-Fiction, #Military, #History

@War: The Rise of the Military-Internet Complex (45 page)

BOOK: @War: The Rise of the Military-Internet Complex
2.31Mb size Format: txt, pdf, ePub
ads

Panetta, Leon,
[>]
,
[>]
,
[>]
–
[>]

password security: bypass of (
see
backdoors); capture of,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; flimsy password,
[>]
; long/harder-to-guess password,
[>]

patent rights,
[>]

“patient zero,”
[>]
,
[>]

PayPal,
[>]

PDD-20, rules of combat,
[>]
–
[>]
,
[>]
n.
[>]

pdf documents,
[>]
–
[>]

Pentagon,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

People's Liberation Army,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
.
See also
Unit 61398/APT1

Petraeus, Gen. David,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]

petroleum power systems,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
.
See also
critical infrastructures

phones.
See
cell phones; telecommunications entries

Polarbreeze,
[>]

political activists.
See
activists, political

political analysis,
[>]
,
[>]

Pretty Good Privacy program,
[>]

Prism data collection,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

privacy issues: anonymity,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; cyber espionage of Americans,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; electronic signatures,
[>]
; government surveillance,
[>]
,
[>]
–
[>]
,
[>]
; medical data,
[>]
,
[>]
,
[>]
; Supreme Court ruling,
[>]
; use of term,
[>]
.
See also
National Security Agency, privacy issues

private sector: alliance with DHS,
[>]
–
[>]
; alliance with the NSA,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
(
see also
Defense Industrial Base; Prism data collection); as bait to catch hackers,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; better pay than the military,
[>]
,
[>]
,
[>]
–
[>]
; boutique firms,
[>]
,
[>]
,
[>]
,
[>]
; cyber arms market,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; cyber espionage against (
see
intellectual property); cyber security businesses,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
(
see also
specific companies); cyber security by,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
, 225–26; DOD contractors (
see
contractors, defense); at government classified threat briefings,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; marketing of cyber security,
[>]
–
[>]
; mercenaries,
[>]
–
[>]
,
[>]
; military-Internet complex,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; percent of computer networks owned by,
[>]
; retaliation by,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
.
See also
legal issues, private sector retaliation

Product Line,
[>]
–
[>]

propaganda,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

Prophet collection “platform,”
[>]
,
[>]
,
[>]

public disclosure, reasons against,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
.
See also
documents/information, declassified; private sector, at government classified threat briefings

 

quarantine, e-mail,
[>]
,
[>]

Qwest Communications,
[>]
–
[>]
,
[>]

 

random number generator,
[>]
–
[>]
,
[>]

Raytheon,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

reachback,
[>]
,
[>]

real-time data,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Real Time Regional Gateway (RTRG),
[>]
–
[>]

release authority,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Remote Control System,
[>]
–
[>]

Remote Operations Center (ROC),
[>]
,
[>]

Rogers, Vice Adm. Michael,
[>]

Romania,
[>]

Rouland, Chris,
[>]
–
[>]
,
[>]

routing systems,
[>]
–
[>]
,
[>]
,
[>]

RSA,
[>]
–
[>]
,
[>]

RTRG.
See
Real Time Regional Gateway

Russia,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

Rustan, Pedro,
[>]
–
[>]

 

Saddam Hussein,
[>]
,
[>]
,
[>]

SAIC,
[>]
,
[>]
,
[>]

satellites,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Saudi Arabia,
[>]
,
[>]

Schaeffer, Richard,
[>]

Schneier, Bruce,
[>]
–
[>]

Schriever Wargame,
[>]
–
[>]
,
[>]
–
[>]

Schuh, Justin,
[>]

“secret sauce.”
See
Alexander, Gen. Keith, bid for NSA's authority by

“secure sockets layer” service,
[>]

selector, within communications metadata,
[>]

servers: Citadel, takeover by Microsoft,
[>]
; command-and-control,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; destruction,
[>]
–
[>]
; as drop point,
[>]
–
[>]
,
[>]
; of e-mail service,
[>]
; imposter, during military breach,
[>]
,
[>]
; NSA,
[>]
,
[>]
; shutdown,
[>]
; Tor,
[>]

Shifting Shadow program,
[>]
–
[>]

SIGINT.
See
signals intelligence

SIGINT Enabling Project,
[>]
,
[>]

Signals Intelligence Directorate,
[>]
,
[>]
,
[>]
,
[>]

signals intelligence (SIGINT),
[>]
,
[>]
,
[>]
,
[>]
,
[>]

signature (hacker methods).
See
threat signature

signature (written name),
[>]

Silk Road,
[>]

sinkholing,
[>]

SkyDrive,
[>]

Skype,
[>]

Snort,
[>]

Snowden, Edward: background,
[>]
–
[>]
; information released by,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
n.
[>]

software: antivirus,
[>]
; cybersecurity,
[>]
; cyber targeting,
[>]
; data filtering,
[>]
; data mining,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; distributed computing,
[>]
,
[>]
; to fend off automated probes,
[>]
; geo-location,
[>]
; malicious (
see
malware; spyware); network forensics,
[>]
,
[>]
–
[>]
,
[>]
; patches and updates for,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; and secret/illegal access (
see
backdoors)

software manufacturers,
[>]
,
[>]
,
[>]
.
See also
specific companies

Sourcefire,
[>]
–
[>]

Soviet Union.
See
Russia; Cold War

spear-phishing,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
.
See also
e-mail, posing as legitimate

Special Operations Command,
[>]
,
[>]
–
[>]
,
[>]

spyware: camera/microphone activation by,
[>]
,
[>]
,
[>]
; by China (
see
China, cyber campaign against the US); installation (
see
spyware, vehicles for); keystroke monitoring,
[>]
,
[>]
,
[>]
,
[>]
; sold by private companies,
[>]
–
[>]
; and spear-phishing,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; used by FBI,
[>]
,
[>]
–
[>]
; used by TAO,
[>]
–
[>]

spyware, vehicles for: e-mail,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; links,
[>]
; software updates,
[>]
–
[>]
,
[>]
,
[>]
; thumb drive,
[>]
,
[>]
,
[>]
–
[>]

Stasio, Bob,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]

Stellar Wind program,
[>]
,
[>]
–
[>]

Stokes, Bruce,
[>]
–
[>]

Stratfor,
[>]
–
[>]

Stuxnet program,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

surveillance technology,
[>]
,
[>]
,
[>]
,
[>]

Sweden,
[>]

Syria,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

 

tactics: botnets,
[>]
,
[>]
,
[>]
,
[>]
; changing nature of,
[>]
,
[>]
,
[>]
; clock skew,
[>]
; crashes,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; cyber kill chain,
[>]
–
[>]
; defense,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; denial-of-service attacks,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; e-mail, posing as legitimate,
[>]
,
[>]
,
[>]
(
see also
spear-phishing); firmware crash,
[>]
; fuzzing,
[>]
–
[>]
; hijacking computers/servers,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; keystroke monitoring,
[>]
,
[>]
,
[>]
,
[>]
; quarantine,
[>]
,
[>]
; redirection of traffic to NSA-controlled server,
[>]
; tagging specific computers,
[>]
; worms,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
(
see also
Stuxnet program).
See also
hack-backs; viruses; zero day exploits

BOOK: @War: The Rise of the Military-Internet Complex
2.31Mb size Format: txt, pdf, ePub
ads

Other books

Down the Rabbit Hole by Peter Abrahams
The Feathery by Bill Flynn
True Believer by Nicholas Sparks
X Marks the Scot by Victoria Roberts
Gray (Book 3) by Cadle, Lou
The Runaway Countess by Leigh Lavalle
(2005) Wrapped in Rain by Charles Martin
Emperor Fu-Manchu by Sax Rohmer