Read Dark Territory Online

Authors: Fred Kaplan

Dark Territory (47 page)

BOOK: Dark Territory
8.76Mb size Format: txt, pdf, ePub
ads

shortcomings of,
177
,
186
,
280
,
281

Hoover, J. Edgar,
251
–52

HowlerMonkey,
136

Hussein, Saddam,
21
,
22
–23,
25
,
74
,
110
,
132
,
143
,
145
,
241

IBM Selectric typewriters,
16

Idaho National Laboratory,
167
,
204

Information Assurance Directorate (NSA),
18
,
34
,
66
,
68
,
92
–93,
128
,
133
,
181
,
201
,
234
,
257
,
260
,
276
,
293
n

Information Operations Center (IOC),
113
,
134
,
161

Information Operations Technology Center (IOTC),
124
–26

information security,
see
cyber security

“Information Security: Computer Attacks at Department of Defense Pose Increasing Risks” (GAO report),
47

Information Security Directorate (NSA),
177

Information Sharing and Analysis Centers (ISACs),
97
,
104
,
139
,
176
,
274

“Information Terrorism: Can You Trust Your Toaster?” (Devost),
273

information warfare,
41
,
58
,
119
,
161
,
169
,
208
,
289
n

and anti-Milosevic campaign,
112
–18

China and,
224

command-control systems and,
see
counter command-control (counter-C2) warfare

history of,
4
,
219
–20

and hunt for Serbian war criminals,
110
–12

McConnell's focus on,
31
–32,
34
–37

U.S. offensive operations in,
108
–10;
see also specific operations

see also
cyber attacks, cyber warfare

infrastructure,
67

computer networks and,
41
,
45
,
52
–55

cyber attacks on,
166
–69,
174
,
198
,
212
,
214
,
215

as cyber attack targets,
104
,
212

cyber security and,
186
–89,
278
,
280
–84

Gates-Napolitano plan for protection of,
186
–89

as targets of terrorist attacks,
39
,
41
,
42
,
53

Infrastructure Protection Task Force:

Moonlight Maze investigation of,
86

Solar Sunrise investigation of,
74
–75

Inglis, John C. “Chris,” 244–48,
252
,
279

Inman, Bobby Ray,
21
–22,
84
,
128
,
132

as CIA deputy director,
27

as naval intelligence director,
14
,
26
–27,
28

as NSA director,
12
–13,
14
,
17
,
18
–19,
27
,
29
,
133

in retirement from government service,
27
–28

Institute for Advanced Studies (Princeton),
8

intelligence agencies:

civil liberties and,
251
–52,
259
,
260

lack of communication between,
171

public-private revolving door in,
172

International Atomic Energy Agency,
301
n

Internet,
47
,
58
,
100
,
164
,
181
,
188
,
193
,
207
,
212

commercial encryption on,
35

cyber security and,
52
–53

data packets on,
5
–6,
131
,
156
,
157
–58

discontinued NSA metadata program for,
253

domain name system of,
191

Estonia and,
162
–63

North Korea disconnected from,
271
–72

terrorism and,
35

vulnerability of,
93
–94,
176
–77

see also
computer networks; World Wide Web

Internet of Things,
6
,
273

Internet Security Systems,
80

Interview, The
(film),
269

intrusion-detection systems (IDS),
80
,
81
,
101
,
120
,
176
,
177
,
278
,
281

Iran:

attack on,
see
Stuxnet

cyber attack on Las Vegas Sands by,
265
–68

cyber warfare and,
4
,
213
,
265
–68

nuclear weapons program of,
198
,
201
,
203
–4,
212

Saudi Aramco attacked by,
213
,
216

Shamoon computer virus developed by,
213

Iranian National Oil Company,
213

Iraq:

command-control network of,
22

insurgency in,
143
,
147
,
150
,
156
,
173
,
180
,
208
,
216
,
241

Kurds in,
160

lack of U.S. intelligence about,
22

NSA teams in,
159
–60

Operation Desert Storm,
21
–23,
29
,
32
,
74
,
149
,
151

Sunni-Shiite conflict in,
147
,
160

U.S. invasion of,
142
–43,
145
,
147
,
240

U.S. troop surge in,
158
,
173

WMD inspectors expelled by,
74

Islam, Sunni-Shiite split in,
147
,
160

Israel,
216

Iranian nuclear program and,
203
–4

Stuxnet and,
207

Syrian reactor bombed by,
160
–61,
198

Unit 8200 of,
161
,
205
,
207
,
213

J-39,
7
,
70
,
81
,
110
–12,
120

anti-Milosevic campaign of,
114
–18,
119

and 1999 Balkans bombing campaign,
112
–14,
119
,
161

Jeep Cherokee, hacking of,
273
n
–74
n

Johnson, Jeh,
270

Joint Chiefs of Staff,
32
,
74
,
146
,
183

Information Operations Response Cell of,
76
,
78

intelligence directorate (J-2) of,
22
,
69

J-39 bureau of,
see
J-39

Joint Computer Conference,
8

Joint Intelligence Center,
22
–23,
24
,
29
,
32
,
132

Joint Special Operations Command (JSOC),
150
,
151
–52,
156

Joint Task Force-Computer Network Defense (JTF-CND),
81
–82,
83
–84,
88
,
105
,
120
–21,
183
,
187
,
276
,
296
n

Joint Task Force-Computer Network Operations (JTF-CNO),
122
,
136

bureaucratic obstructions to,
146
–47

Joint Task Force-Global Network Operations,
183

Justice Department, U.S.,
63
,
155

cyber crime and,
41
–42

Information Infrastructure Task Force Coordinating Committee of,
42

Infrastructure Protection Task Force of,
see
Infrastructure Protection Task Force

Section 215 case and,
262

Kaspersky Lab,
210

Kelly Air Force Base,
see
Air Force Information Warfare Center

KGB,
12
,
16
,
84

Khamenei, Ayatollah Ali,
266

Kim Jong-un,
269

Kingsley, Ben,
31

Kuwait,
21

Kuwait City,
22

L0pht,
90
–91,
94
,
95
,
98
,
103

L0phtCrack,
92

Lacombe, Phillip,
52
–53

Lake, Anthony,
40

Lane, Charles,
44

Langley, Va.,
6

Langner, Ralph,
210
,
211

Lasker, Lawrence,
9
–10,
32
,
287
n

Las Vegas Sands Corporation, cyber attack on,
265
–68

Latham, Donald,
6
,
19
,
20
,
54

Law of Armed Conflict,
25

Lawrence Berkeley National Laboratory,
61
–62

Lawrence Livermore National Laboratory,
62

Levitt, Karl,
62

Lewinsky, Monica,
103
,
115

Liberty and Security in a Changing World
(Review Group report),
255
,
258
–59,
285

Lieberman, Joe,
95

Lockheed Martin,
120

Chinese cyber attack on,
224
–25

LoudAuto,
136

Lukasik, Stephen,
9

Lute, Jane Holl,
188
,
189
,
302
n
–3
n

McAfee, Chinese cyber attacks tracked by,
226

McCain, John,
197
,
198
,
283

McCarthy, John,
97

McChrystal, Stanley,
159
,
173

as JSOC commander,
150
,
151
–52

McConnell, John “Mike,” 57,
169
,
183
,
194
,
248

Bush briefed on cyber warfare by,
173
–75,
187

Clipper Chip and,
36
–37,
40
,
58
,
128

CNCI plan of,
177
–78,
198
–99,
278

Cyber Command proposed by,
185

cyber deterrence and,
278

cyber security as priority of,
172
,
198
,
278

as director of national intelligence,
171
–78,
191
–92,
216

FISA and,
192
–93

information warfare as priority of,
31
–32,
34
–37

as Joint Intelligence Center head,
22
–23,
29

as NSA director,
29
,
30
–37,
128
,
133
,
172
,
173
,
193

Obama's replacing of,
200

in pre-election briefing of Obama,
197
–98

Sneakers
as epiphany for,
33

McDermott, Thomas,
68

McDonough, Denis,
238

McVeigh, Timothy,
39

MAE East,
191
n

MAE West,
191
n

Makaveli (pseudonym),
77
–78

Maliki, Nouri al-,
160

malware,
182
,
205
–6,
207
–8,
266

Mandia, Kevin,
85
,
87
,
223
,
225
,
269
,
292
n
–93
n

Mandiant,
85
n,
222–23,
225
,
226
,
269
,
292
n

Marine Corps, Computer Network Defense unit of,
123

Marsh, Robert T. “Tom,” 50,
51
,
52
,
72

Marshall, Richard H. L.,
24
–25,
68

Marsh Commission,
98
–99

Marsh Report (
Critical Foundations
),
53
–55,
72
,
80
,
89
,
94
,
100
,
139
,
142
,
166
,
199
,
241

Mellon, Christopher,
35

Merkel, Angela, NSA hacking of,
235
,
260

metadata,
61
,
154

Alexander and,
230
,
231
,
233
,
253
,
256

FISA Court and,
245
,
246
,
253
,
256
,
261
,
262
,
263

NSA's collection and storage of,
64
,
194
–97,
230
–35,
238
,
245
–47,
252
–54,
261
–62,
263

Obama “white paper” on,
238

telecom companies and,
194
,
247
,
248
,
253
,
263

BOOK: Dark Territory
8.76Mb size Format: txt, pdf, ePub
ads

Other books

Leftovers by Chloe Kendrick
Uninvolved by Carey Heywood
Bad To The Bone by Katy Munger
Apportionment of Blame by Keith Redfern
This Rotten World (Book 1) by Vocabulariast, The
Fallen by Karin Slaughter
Between Sundays by Karen Kingsbury
The Houseguest by Kim Brooks