Authors: Fred Kaplan
Clarke, Richard,
139
,
174
,
175
â76,
177
,
191
n,
200,
225
,
274
books written by,
240
â42
in Bush (G.W.) administration,
140
â41,
143
as Clinton's counterterrorism adviser,
89
,
95
â97
critical-infrastructure plan of,
239
â40
FBI briefing and,
254
â55
Hamre and,
95
â96
L0pht and,
91
â4
National Plan for Information Systems Protection
written by,
100
â105,
141
â42
9/11 attacks and,
141
9/11 Commission testimony of,
240
PDD-63 as drafted by,
97
â99
presumptuousness of,
95
â96,
98
,
101
,
240
in Review Group,
240
,
243
,
245
,
247
,
251
,
253
,
254
â55
Clinton, Bill,
3
,
40
,
55
,
74
,
87
,
89
,
96
,
102
,
115
,
175
â76,
239
cyber security summit of,
102
â4
Executive Order 13010 of,
47
,
48
â49,
74
Haitian invasion planned by,
58
â59,
107
â8
PDD-39 of,
39
â40
PDD-63 of,
95
Clipper Chip,
36
â37,
40
,
58
,
100
,
128
,
239
,
244
CNCI,
see
Comprehensive National Cybersecurity Initiative (CNCI)
Coalition Vulnerability Assessment Team,
65
â66
cryptology in,
13
espionage in,
138
â39
NSA and,
12
nuclear options in,
218
unspoken rules in,
272
â73
command-control systems,
13
,
15
,
43
,
51
,
65
,
224
Commerce Department, U.S.,
34
cyber security as viewed in,
172
â73
Comprehensive National Cybersecurity Initiative (CNCI),
177
â78,
180
,
198
â99,
278
Computer Crime Initiative Plan,
41
â42
computer industry:
cyber security as low priority of,
102
â3,
104
â5,
176
PDD-63 resisted by,
98
,
99
â100
Snowden leaks and,
234
Computer Network Attack (CNA),
122
,
137
â38,
180
,
204
,
211
,
212
,
219
,
220
,
281
,
283
Computer Network Defense (CND),
122
,
137
â38,
180
Computer Network Exploitation (CNE),
137
â38,
180
,
204
,
212
,
281
computer networks,
33
IDS devices in,
176
infrastructure and,
41
,
45
,
52
â53
inherent vulnerability of,
172
,
174
,
176
â77,
179
,
206
â7,
241
,
276
â77
see also
Internet
computers, computer software:
omnipresence of,
5
race between hackers and patchers in,
136
â37
security of,
see
cyber security
zero-day vulnerabilities in,
137
Computers at Risk
(National Research Council),
54
Computer Sciences Corp.,
132
Computer Security Act (1987),
34
Computer Security Center (NSA),
18
â19,
34
,
60
Congress, U.S.,
192
CNCI and,
178
â79
defense authorization bills of,
46
â47
select intelligence committees of,
256
Congressional Budget Office,
71
Constitution, U.S., Fourth Amendment of,
192
,
250
Cornerstones of Information Warfare
(Weaver),
108
corporations:
cyber security as low priority of,
102
â3,
104
â5,
176
,
274
regulations feared by,
98
â99,
101
,
176
,
200
,
274
â75
as reluctant to share information,
281
â82
Cotter, George,
18
â19
counter command-control (counter-C2) warfare,
15
â16,
33
,
41
,
58
,
59
,
76
,
84
,
220
in Desert Storm,
21
â25
counterinsurgency strategies,
148
,
158
â59,
160
Critical Foundations
(Marsh Report),
53
â55,
72
,
80
,
89
,
94
,
100
,
139
,
142
,
166
,
199
,
241
“Critical Infrastructure Protection” (PDD-63),
95
,
139
Clarke's draft of,
97
â99
computer industry objections to,
98
,
99
â100
see also National Plan for Information Systems Protection
Critical Infrastructure Working Group,
40
â41,
42
â43,
48
,
51
Cryptolog,
219â20
Cuckoo's Egg, The
(Stoll),
61
,
82
â83
“cyber,” first use of term,
45
â46
cyber attacks, cyber warfare,
4
â6,
53
Abizaid's prioritizing of,
145
â48,
149
â50
Alexander's expertise in,
149
,
157
â58
Bush (G.W.) administration and,
3
on Central Command,
181
â84,
185
by China,
see
China, cyber warfare by
denial-of-service,
102
â3,
162
â63,
213
,
216
distinction between national security and property theft in,
227
Eligible Receiver in,
see
Eligible Receiver 97 cyber attack exercise
escalation of,
213
â20,
273
â74,
284
Gates's concern about,
272
â73
infrastructure as targets of,
104
and inherent vulnerability of networks,
276
â77
against Iraq insurgents,
158
â60,
173
,
180
on Las Vegas Sands Corporation,
265
â68
Law of Armed Conflict and,
25
Moonlight Maze and,
78
â79,
81
â88,
98
,
119
,
123
,
187
,
212
â13,
223
,
241
,
276
morality of,
215
by North Korea,
4
,
213
,
216
,
268
â71,
272
n
nuclear weapons vs.,
215
â16,
218
Obama administration and,
3
â4
physical damage from,
166
â69,
174
,
198
,
214
,
215
political influence as goal of,
267
race between hackers and patchers in,
136
â37
Reagan administration and,
1
â3,
6
â7
risks of,
212
â13
secrecy of,
212
,
214
â15,
216
,
219
,
284
â85
Solar Sunrise and,
74
â78,
80
,
81
,
98
,
101
,
119
,
120
,
123
,
183
,
187
,
241
terrorists and,
98
unintended consequences of,
217
U.S. military's resistance to,
117
â18,
119
,
120
U.S. offensive operations in,
4
,
48
â49,
174
,
211
â12,
291
n
zero-day vulnerabilities and,
137
see also
hacking, hackers; information warfare;
specific operations and attacks
Cyber Command, U.S.,
4
,
211
,
279
â80
combatant support mission of,
280
,
283
consolidation of armed services cyber agencies under,
195
critical-infrastructure security mission of,
280
â83
Defense Department network security mission of,
280
,
283
McConnell's proposal for,
185
Review Group recommendations for,
257
Rogers as head of,
282
Cyber Council,
176
CNE and,
139
cyber deterrence,
283
asymetrical response in,
277
â78
Defense Science Board and,
278
â79
McConnell and,
278
nuclear deterrence vs.,
284
â85
cyber-offensive teams,
211
â12
Cyber Operations Policy Working Group,
217
active defense (offensive operations) in,
281
,
282
,
283
air gaps in,
206
â7
ARPANET and,
8
â9
banking industry's low priority for,
175
Bush (G.W.) administration complacency about,
140
â41
Clinton's summit on,
102
â4
CNE and,
139
computer industry's low priority for,
102
â3,
104
â5,
176
computer networks and,
33
Defense Science Board report on,
275
â79
detection as goal of,
277
exponential rise in breaches of,
273
â74
information-sharing and,
281
â82
infrastructure and,
186
â89
Internet and,
52
â53
McConnell's briefing of Bush on,
174
â75
McConnell's focus on,
172
,
198
,
278
military's complacency about,
64
,
105
,
119
Obama's prioritizing of,
200
â201
resilience as goal of,
277
Review Group's prioritizing of,
257
â58
Wilhelm's focus on,
40
as domain of warfare,
6
Cyberspace Policy Review,
199â200
Cyber War
(Clarke),
241
â42,
243
DarkSeoul,
269
data packets,
5
â6,
131
,
156
,
157
â58,
192
â93,
194
,
248
,
249
â50
DEF CON Hacking Conference,
136
defense contractors: