Read @War: The Rise of the Military-Internet Complex Online
Authors: Shane Harris
Tags: #Computers, #Non-Fiction, #Military, #History
Panetta, Leon,
[>]
,
[>]
,
[>]
â
[>]
password security: bypass of (
see
backdoors); capture of,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; flimsy password,
[>]
; long/harder-to-guess password,
[>]
patent rights,
[>]
PayPal,
[>]
PDD-20, rules of combat,
[>]
â
[>]
,
[>]
n.
[>]
Pentagon,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
People's Liberation Army,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
.
See also
Unit 61398/APT1
Petraeus, Gen. David,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
petroleum power systems,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
.
See also
critical infrastructures
phones.
See
cell phones; telecommunications entries
Polarbreeze,
[>]
political activists.
See
activists, political
Pretty Good Privacy program,
[>]
Prism data collection,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
privacy issues: anonymity,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; cyber espionage of Americans,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; electronic signatures,
[>]
; government surveillance,
[>]
,
[>]
â
[>]
,
[>]
; medical data,
[>]
,
[>]
,
[>]
; Supreme Court ruling,
[>]
; use of term,
[>]
.
See also
National Security Agency, privacy issues
private sector: alliance with DHS,
[>]
â
[>]
; alliance with the NSA,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
(
see also
Defense Industrial Base; Prism data collection); as bait to catch hackers,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
; better pay than the military,
[>]
,
[>]
,
[>]
â
[>]
; boutique firms,
[>]
,
[>]
,
[>]
,
[>]
; cyber arms market,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
; cyber espionage against (
see
intellectual property); cyber security businesses,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
â
[>]
(
see also
specific companies); cyber security by,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
, 225â26; DOD contractors (
see
contractors, defense); at government classified threat briefings,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; marketing of cyber security,
[>]
â
[>]
; mercenaries,
[>]
â
[>]
,
[>]
; military-Internet complex,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
; percent of computer networks owned by,
[>]
; retaliation by,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
.
See also
legal issues, private sector retaliation
propaganda,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
Prophet collection “platform,”
[>]
,
[>]
,
[>]
public disclosure, reasons against,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
.
See also
documents/information, declassified; private sector, at government classified threat briefings
Â
Qwest Communications,
[>]
â
[>]
,
[>]
Â
random number generator,
[>]
â
[>]
,
[>]
Raytheon,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
real-time data,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
Real Time Regional Gateway (RTRG),
[>]
â
[>]
release authority,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
Remote Control System,
[>]
â
[>]
Remote Operations Center (ROC),
[>]
,
[>]
Rogers, Vice Adm. Michael,
[>]
Romania,
[>]
routing systems,
[>]
â
[>]
,
[>]
,
[>]
RTRG.
See
Real Time Regional Gateway
Russia,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
Â
satellites,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
Schaeffer, Richard,
[>]
Schriever Wargame,
[>]
â
[>]
,
[>]
â
[>]
Schuh, Justin,
[>]
“secret sauce.”
See
Alexander, Gen. Keith, bid for NSA's authority by
“secure sockets layer” service,
[>]
selector, within communications metadata,
[>]
servers: Citadel, takeover by Microsoft,
[>]
; command-and-control,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; destruction,
[>]
â
[>]
; as drop point,
[>]
â
[>]
,
[>]
; of e-mail service,
[>]
; imposter, during military breach,
[>]
,
[>]
; NSA,
[>]
,
[>]
; shutdown,
[>]
; Tor,
[>]
Shifting Shadow program,
[>]
â
[>]
SIGINT.
See
signals intelligence
SIGINT Enabling Project,
[>]
,
[>]
Signals Intelligence Directorate,
[>]
,
[>]
,
[>]
,
[>]
signals intelligence (SIGINT),
[>]
,
[>]
,
[>]
,
[>]
,
[>]
signature (hacker methods).
See
threat signature
signature (written name),
[>]
Silk Road,
[>]
sinkholing,
[>]
SkyDrive,
[>]
Skype,
[>]
Snort,
[>]
Snowden, Edward: background,
[>]
â
[>]
; information released by,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
n.
[>]
software: antivirus,
[>]
; cybersecurity,
[>]
; cyber targeting,
[>]
; data filtering,
[>]
; data mining,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
; distributed computing,
[>]
,
[>]
; to fend off automated probes,
[>]
; geo-location,
[>]
; malicious (
see
malware; spyware); network forensics,
[>]
,
[>]
â
[>]
,
[>]
; patches and updates for,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; and secret/illegal access (
see
backdoors)
software manufacturers,
[>]
,
[>]
,
[>]
.
See also
specific companies
Soviet Union.
See
Russia; Cold War
spear-phishing,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
.
See also
e-mail, posing as legitimate
Special Operations Command,
[>]
,
[>]
â
[>]
,
[>]
spyware: camera/microphone activation by,
[>]
,
[>]
,
[>]
; by China (
see
China, cyber campaign against the US); installation (
see
spyware, vehicles for); keystroke monitoring,
[>]
,
[>]
,
[>]
,
[>]
; sold by private companies,
[>]
â
[>]
; and spear-phishing,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; used by FBI,
[>]
,
[>]
â
[>]
; used by TAO,
[>]
â
[>]
spyware, vehicles for: e-mail,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
; links,
[>]
; software updates,
[>]
â
[>]
,
[>]
,
[>]
; thumb drive,
[>]
,
[>]
,
[>]
â
[>]
Stasio, Bob,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
Stellar Wind program,
[>]
,
[>]
â
[>]
Stuxnet program,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
surveillance technology,
[>]
,
[>]
,
[>]
,
[>]
Sweden,
[>]
Â
tactics: botnets,
[>]
,
[>]
,
[>]
,
[>]
; changing nature of,
[>]
,
[>]
,
[>]
; clock skew,
[>]
; crashes,
[>]
â
[>]
,
[>]
â
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; cyber kill chain,
[>]
â
[>]
; defense,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
,
[>]
,
[>]
â
[>]
; denial-of-service attacks,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; e-mail, posing as legitimate,
[>]
,
[>]
,
[>]
(
see also
spear-phishing); firmware crash,
[>]
; fuzzing,
[>]
â
[>]
; hijacking computers/servers,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; keystroke monitoring,
[>]
,
[>]
,
[>]
,
[>]
; quarantine,
[>]
,
[>]
; redirection of traffic to NSA-controlled server,
[>]
; tagging specific computers,
[>]
; worms,
[>]
,
[>]
,
[>]
,
[>]
â
[>]
,
[>]
(
see also
Stuxnet program).
See also
hack-backs; viruses; zero day exploits