@War: The Rise of the Military-Internet Complex (43 page)

Read @War: The Rise of the Military-Internet Complex Online

Authors: Shane Harris

Tags: #Computers, #Non-Fiction, #Military, #History

BOOK: @War: The Rise of the Military-Internet Complex
5.94Mb size Format: txt, pdf, ePub

Federal Bureau of Investigation (FBI),
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]

fiber-optic trunk lines,
[>]
,
[>]
,
[>]

Fick, Nathaniel,
[>]
–
[>]

fifth domain, cyberspace as the,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

file-sharing networks,
[>]
–
[>]

financial and banking data systems: clearinghouse network,
[>]
; cyber breaches,
[>]
–
[>]
,
[>]
–
[>]
; cyber security,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; denial-of-service attacks,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; hack-back against Citadel,
[>]
–
[>]
; risks of malware use in military context,
[>]
–
[>]
,
[>]
.
See also
critical infrastructures

FinFisher software,
[>]
–
[>]
,
[>]

FireEye,
[>]
,
[>]

Firefox,
[>]

First Amendment,
[>]

FISA.
See
Foreign Intelligence Surveillance Act

Flatliquid operation,
[>]
–
[>]
,
[>]
n.
[>]

Foreign Intelligence Surveillance Act (FISA),
[>]
,
[>]
–
[>]
,
[>]

Foreign Intelligence Surveillance Court,
[>]
,
[>]
–
[>]
,
[>]

foreign policy, US: for China,
[>]
–
[>]
,
[>]
–
[>]
; international cyber agreements,
[>]
,
[>]
; and monitoring of foreigners,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]

forensics, network,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

Fourth Amendment,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

France,
[>]
–
[>]
,
[>]
–
[>]
,
[>]

F-35.
See
Joint Strike Fighter

future innovations in cyber security,
[>]
–
[>]

future scenario for cyberspace,
[>]
–
[>]

fuzzing,
[>]
–
[>]

 

Gates, Robert,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

gateways,
[>]
,
[>]

Google: alliance with NSA,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
; China market,
[>]
; cyber security,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
; distributed computing,
[>]
; Gmail,
[>]
,
[>]
,
[>]
,
[>]
; NSA's secret monitoring of,
[>]
,
[>]
; retaliation against China,
[>]
–
[>]
,
[>]
,
[>]
n.
[>]
; telecommunications networks,
[>]
; user statistics,
[>]

gray market,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

 

hack-backs,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

hackers: anonymity,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; catching (
see
hackers, catching); conferences,
[>]
,
[>]
,
[>]
,
[>]
; freelance,
[>]
,
[>]
–
[>]
; groups (
see
Anonymous; LulzSec); hacktivists,
[>]
,
[>]
; mercenaries,
[>]
–
[>]
,
[>]
; within the NSA (
see
Tailored Access Operations); as pirates/privateers,
[>]
; retaliation against (
see
hack-backs; private sector, retaliation by); trained for US cyber warfare,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
; “white hat” and “black hat,”
[>]
,
[>]

hackers, catching: bounty system,
[>]
; FBI activities,
[>]
–
[>]
; honeypots,
[>]
,
[>]
,
[>]
,
[>]
; imposter server,
[>]
; network forensics,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
; private companies as bait,
[>]
–
[>]
,
[>]
,
[>]
–
[>]

Hacking Team,
[>]
–
[>]

Hammond, Jeremy,
[>]
–
[>]
,
[>]

Harris Corporation,
[>]

Hayden, Lt. Gen. Michael,
[>]
–
[>]
,
[>]
,
[>]

honeypot,
[>]
,
[>]
,
[>]
,
[>]

Hu, Jintao,
[>]

Huawei,
[>]

Hunton Williams,
[>]
.
See also
Team Themis

Hutchins, Eric,
[>]
,
[>]
–
[>]

 

IBM,
[>]
,
[>]
,
[>]

iDefense,
[>]

India,
[>]

informants,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

Information Operations Center (IOC),
[>]

Information Operations Command,
[>]

In-Q-Tel,
[>]
,
[>]

intellectual property, cyber theft: by China,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
n.
[>]
(
see also
private sector, retaliation); of Google,
[>]
–
[>]
,
[>]
n.
[>]
; of Target,
[>]
,
[>]

Internet: anonymity,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; anticensorship projects,
[>]
,
[>]
; as a battlefield,
[>]
–
[>]
,
[>]
; domain issues,
[>]
,
[>]
; gateways,
[>]
,
[>]
; illegal activities (
see
cybercrime); inherent vulnerability in access to,
[>]
,
[>]
,
[>]
; invention,
[>]
; military-Internet complex,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

Internet browsers,
[>]

Internet cafes,
[>]
–
[>]
,
[>]

Internet protocol addresses: compilation (
see
Defense Industrial Base; Prism data collection); hiding (
see
Internet, anonymity); private companies that provide (
see
mercenaries); security,
[>]
,
[>]
,
[>]
,
[>]

Internet Security Systems,
[>]

Internet service providers: during bank cyber breach,
[>]
,
[>]
; CIA installation of spyware,
[>]
; concerns working with US government,
[>]
,
[>]
,
[>]
–
[>]
; and the NSA,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; as Tier
[>]
,
[>]

IOC.
See
Information Operations Center

Iran,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
.
See also
Stuxnet program

Iraq,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

Ironavenger operation,
[>]

Israel,
[>]
,
[>]

Italy,
[>]
–
[>]

Izz ad-Din al-Qassam Brigades,
[>]
,
[>]

 

Johnson & Johnson,
[>]

Joint Chiefs of Staff,
[>]
,
[>]
–
[>]
,
[>]

Joint Special Operations Command (JSOC),
[>]
,
[>]
,
[>]
–
[>]
,
[>]

Joint Strike Fighter (F-35),
[>]
–
[>]
,
[>]
,
[>]
,
[>]

 

keystroke monitoring,
[>]
,
[>]
,
[>]
,
[>]

kill chain,
[>]
.
See also
cyber kill chain

kill switch provision,
[>]

Kleiner Perkins Caufield & Byers,
[>]

Kosovo War,
[>]

Kuwait,
[>]

 

LabMD,
[>]

law enforcement: city police,
[>]
; Europol,
[>]
; “law enforcement sensitive” data,
[>]
,
[>]
; prosecution,
[>]
,
[>]
.
See also
Federal Bureau of Investigation

leads, within communications metadata,
[>]

legal issues: bin Laden mission,
[>]
–
[>]
; cyber warfare with Iran,
[>]
; hacker used by government for illegal activities,
[>]
; information sharing,
[>]
; international laws less stringent,
[>]
,
[>]
,
[>]
,
[>]
; lawsuit against Stratfor,
[>]
; liability concerns,
[>]
,
[>]
; no international body/treaty in cyber warfare,
[>]
,
[>]
; of NSA communication monitoring (
see
legal issues, monitoring by the NSA); patent rights,
[>]
; retaliation (
see
legal issues, private sector retaliation); US law for covert operations vs. international law for military operations,
[>]

legal issues, monitoring by the NSA: attacking Tor nodes,
[>]
; of banks,
[>]
; contact chaining,
[>]
,
[>]
,
[>]
; under FISA,
[>]
,
[>]
–
[>]
; foreign/of foreigners,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
; RTRG,
[>]
–
[>]
; of individuals vs. groups of people,
[>]
–
[>]
; tapping,
[>]
,
[>]
,
[>]

legal issues, private sector retaliation: by Google,
[>]
–
[>]
,
[>]
–
[>]
; government action campaign,
[>]
; as illegal,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; legal permission,
[>]
,
[>]
,
[>]
,
[>]

legal rulings.
See
Foreign Intelligence Surveillance Court; US Department of Justice; US Supreme Court

Libya,
[>]

listening posts,
[>]

Lockheed Martin,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

log-in.
See
password security

LulzSec,
[>]
,
[>]

Lute, Jane Holl,
[>]
–
[>]

 

MAC.
See
Metadata Analysis Center

Magic Lantern software,
[>]
,
[>]
–
[>]

malware: e-mail as vehicle for,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
(
see also
e-mail, posing as legitimate); identification of targets (
see
spear-phishing); infiltration of al-Qaeda,
[>]
,
[>]
; installation strategies,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; kill switch to prevent,
[>]
; returned to hacker,
[>]
; reverse engineering of,
[>]
; used by the CIA,
[>]
,
[>]

Other books

Lies That Bind by Maggie Barbieri
When She Was Bad... by Louise Bagshawe
Still thicker than water by Takerra, Allen
Silver's Captive by Lee-Ann Wallace
When Mr. Dog Bites by Brian Conaghan
This Gorgeous Game by Donna Freitas