@War: The Rise of the Military-Internet Complex (41 page)

Read @War: The Rise of the Military-Internet Complex Online

Authors: Shane Harris

Tags: #Computers, #Non-Fiction, #Military, #History

BOOK: @War: The Rise of the Military-Internet Complex
4.65Mb size Format: txt, pdf, ePub
Index

Accumulo software,
[>]

activists, political,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Adobe,
[>]
,
[>]
–
[>]

advanced persistent threat (APT),
[>]
,
[>]
,
[>]
–
[>]
,
[>]

Afghanistan,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]

agent, malware,
[>]
–
[>]

Agent.btz,
[>]
–
[>]
,
[>]
–
[>]

aircraft, military,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
n.
[>]

air gap,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

air traffic control,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

Alexander, Gen. Keith: bid for NSA's authority by,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; as director of NSA,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; lobbying,
[>]
,
[>]
,
[>]
; military cyber breach,
[>]
–
[>]
; national cyber defense plan,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; recruitment by,
[>]
,
[>]
,
[>]

algorithm, encryption,
[>]
–
[>]
,
[>]

Allen & Company,
[>]

al-Qaeda: campaign in Iraq,
[>]
,
[>]
,
[>]
; conference call information,
[>]
; corporate intranet of, sabotage,
[>]
,
[>]
; NSA cyber warfare against,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; recruitment by,
[>]
; sanctuary in Afghanistan,
[>]
; Sunni Awakening denouncement of,
[>]
; US cell phone monitoring,
[>]
,
[>]
,
[>]
,
[>]

Amazon,
[>]
,
[>]

American Express,
[>]
,
[>]
–
[>]

anonymity issues,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

Anonymous (hacker group),
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

Apple,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

APT.
See
advanced persistent threat

APT1.
See
Unit 61398/APT1

Aramco,
[>]

Ashcroft, John,
[>]

AT&T,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

attribution problem,
[>]

Aurora.
See
China, cyber campaign against the US

Australia,
[>]

authority for cyber warfare: conference call cabinet,
[>]
; covert operations vs. military operations,
[>]
; critical infrastructures and legal issues,
[>]
,
[>]
,
[>]
; Cyber Command for cyber attack,
[>]
–
[>]
; and definition of “hostile act,”
[>]
; FBI for domestic attack,
[>]
,
[>]
; government action campaign for private sector,
[>]
; president,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; Strategic Command for coordinated military attack,
[>]

 

backdoors,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Bahrain,
[>]
,
[>]

Bank of America,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]

banks.
See
financial and banking data systems

Barr, Aaron,
[>]
–
[>]

Basla, Lt. Gen. Michael,
[>]
,
[>]
,
[>]

beacons,
[>]
–
[>]

Beckstrom, Rod,
[>]
–
[>]

Berico Technologies,
[>]
,
[>]

Berlin, Charles,
[>]

big ass graph,
[>]

bin Laden, Osama,
[>]
,
[>]
,
[>]
–
[>]

black-bag operations,
[>]
,
[>]
,
[>]

Black Hat conference,
[>]
,
[>]
,
[>]
,
[>]

blackout (electrical),
[>]
,
[>]
,
[>]
–
[>]
,
[>]

blackout (media),
[>]

Bonesaw software,
[>]

Booz Allen Hamilton,
[>]
,
[>]
,
[>]

Bosnia,
[>]

botnets,
[>]
,
[>]
,
[>]
,
[>]

Boys & Girls Clubs of America,
[>]

Brazil,
[>]
–
[>]
,
[>]
n.
[>]

Britain,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

bSafe toolkit,
[>]

Buckshot Yankee,
[>]
–
[>]
,
[>]

Bush, George W.: cyber warfare authorization,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; national cyber defense plan,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; NSA authorizations,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

businesses.
See
contractors, defense; private sector

 

Calderón, Felipe,
[>]
–
[>]

camera/video data,
[>]
,
[>]
,
[>]
,
[>]

Canada,
[>]
,
[>]
–
[>]
,
[>]

Carnivore software,
[>]

cell phones: in Afghanistan,
[>]
,
[>]
; al-Qaeda,
[>]
,
[>]
,
[>]
,
[>]
; contact chaining,
[>]
,
[>]
,
[>]
–
[>]
; disruption tactics,
[>]
,
[>]
–
[>]
; iPhone,
[>]
,
[>]
,
[>]
; in Iraq,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; tracking of owner,
[>]
,
[>]

censorship,
[>]
,
[>]
,
[>]

Central Command for the Middle East,
[>]
,
[>]
–
[>]

Central Intelligence Agency (CIA): al-Qaeda,
[>]
,
[>]
,
[>]
,
[>]
; cloud built for,
[>]
; drone technology,
[>]
,
[>]
; and Endgame,
[>]
,
[>]
,
[>]
; human spies,
[>]
,
[>]
; Information Operations Center,
[>]
; Iraq War,
[>]
; partnerships,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
; Technology Management Office,
[>]
; venture capital group of,
[>]
,
[>]

CenturyLink,
[>]
,
[>]
,
[>]
,
[>]

Chabinsky, Steve,
[>]
,
[>]

Cheney, Dick,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

Chertoff, Michael,
[>]
–
[>]

children's issues,
[>]
–
[>]

China: activists,
[>]
,
[>]
,
[>]
,
[>]
; growth,
[>]
–
[>]
; as lender to the US,
[>]
–
[>]
; NSA cyber espionage on university,
[>]
–
[>]
; People's Liberation Army,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; trade with US,
[>]
,
[>]
,
[>]
,
[>]
; US bombing of embassy,
[>]
; US cyber espionage against,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; US foreign relations,
[>]
–
[>]
,
[>]
–
[>]
; war with US, consequences,
[>]
,
[>]
,
[>]

China, cyber campaign against the US (Aurora): as an APT,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
; Chinese government position on,
[>]
,
[>]
,
[>]
,
[>]
; context,
[>]
–
[>]
; energy/power systems,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; extent,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
; F-35 jet,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
; intellectual property (
see
intellectual property, cyber theft, by China); Mandiant report on,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; Obama administration on,
[>]
; recruitment,
[>]
–
[>]
,
[>]
; tracking by the US,
[>]
–
[>]
,
[>]
,
[>]
; Unit 61398/APT1,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; US government sites,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; US media,
[>]
–
[>]

CIA.
See
Central Intelligence Agency

Cisco,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]

Citadel,
[>]
–
[>]

civil rights,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

classified information.
See
documents/information, classified

clearinghouse network,
[>]

Clinton, Hillary,
[>]
,
[>]
,
[>]
,
[>]

clock skew,
[>]

cloud storage service,
[>]
,
[>]
,
[>]

Coca-Cola,
[>]

Cold War,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

Comey, James,
[>]
,
[>]

command-and-control servers,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Computer Associates,
[>]

computers: cameras in,
[>]
,
[>]
,
[>]
; captured laptops,
[>]
,
[>]
; hijacked,
[>]
; internal clocks,
[>]
; tagging specific,
[>]

conferences, hacker,
[>]
,
[>]
,
[>]
,
[>]

Conlon, Brendan,
[>]

Constitution, US,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

contact chaining/call chains,
[>]
,
[>]
,
[>]
–
[>]

contractors, defense: cyber breaches,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
n.
[>]
; cyber security firms,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; major,
[>]
,
[>]
; role in US military,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; use of zero day market,
[>]
,
[>]
.
See also
Defense Industrial Base; military-industrial complex

Other books

The Beam: Season Two by Sean Platt, Johnny B. Truant
The Music of the Night by Amanda Ashley
Kill Call by Stephen Booth
The Apocalypse Crusade 2 by Peter Meredith
No Wok Takeout by Victoria Love
Poison by Sarah Pinborough
Flea Market Fatal by Brianna Bates
Outliers by Malcolm Gladwell