@War: The Rise of the Military-Internet Complex (44 page)

Read @War: The Rise of the Military-Internet Complex Online

Authors: Shane Harris

Tags: #Computers, #Non-Fiction, #Military, #History

BOOK: @War: The Rise of the Military-Internet Complex
5.72Mb size Format: txt, pdf, ePub

Mandia, Kevin,
[>]

Mandiant,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]

Mansoor, Ahmed,
[>]
–
[>]

marketing of safety,
[>]
–
[>]

McAfee,
[>]
,
[>]

McConnell, Mike: background,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; cyber warfare proposal to NSC,
[>]
–
[>]
,
[>]
; development of Cyber Command,
[>]
–
[>]
; as director of national intelligence,
[>]
,
[>]
–
[>]
; as director of NSA,
[>]
,
[>]
–
[>]
; national cyber defense plan,
[>]
–
[>]
,
[>]
,
[>]
; security briefing with Obama,
[>]
–
[>]
,
[>]

McRaven, Adm. Bill,
[>]
–
[>]

media,
[>]
,
[>]
,
[>]
–
[>]

medical data and facilities,
[>]
,
[>]
,
[>]
,
[>]

mercenaries,
[>]
–
[>]
,
[>]

Metadata Analysis Center (MAC),
[>]
–
[>]

Mexico,
[>]
–
[>]

Microsoft,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

Middle East,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]

military: command-and-control structure,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; communications monitoring,
[>]
–
[>]
; cyber espionage on members,
[>]
; cyber recruitment and training,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; rules of combat,
[>]
–
[>]
,
[>]
n.
[>]
.
See also
warfare

military-industrial complex,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

military-Internet complex,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

military networks: command-and-control structure, cyber,
[>]
–
[>]
,
[>]
; cyber breaches,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
n.
[>]
; mission to defend,
[>]
–
[>]
,
[>]
–
[>]
; weapons systems,
[>]
,
[>]
,
[>]
,
[>]

Miller, Charlie,
[>]

missile systems,
[>]

Monsegur, Hector Xavier,
[>]
–
[>]

Mubarak, Hosni,
[>]

Mueller, Robert,
[>]
,
[>]

Mullen, Adm. Mike,
[>]
–
[>]
,
[>]

 

Napolitano, Janet,
[>]
,
[>]

National Aeronautics and Space Administration (NASA),
[>]
–
[>]

National Institute of Standards and Technology (NIST),
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]

National Park Service,
[>]

National Reconnaissance Office,
[>]
,
[>]

National Security Agency (NSA): alliance with private sector,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
(
see also
Defense Industrial Base; Prism data collection); alliance with the FBI,
[>]
–
[>]
,
[>]
; anti-Tor campaign,
[>]
–
[>]
; Commander's Action Group,
[>]
–
[>]
; communications monitoring by (
see
National Security Agency, communications monitoring); Computer Network Operations,
[>]
; creation,
[>]
,
[>]
–
[>]
; Cyber Center,
[>]
; data collection and management,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; development of sabotage capability,
[>]
(
see also
al-Qaeda); distrust of,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; Fort Meade headquarters,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; Google retaliation,
[>]
–
[>]
,
[>]
; hunt team,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; insertion of vulnerabilities by,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; leak by Snowden (
see
Snowden, Edward); military cyber breach,
[>]
–
[>]
,
[>]
; National Cyber Investigative Joint Task Force,
[>]
; National Security Operations Center,
[>]
; national cyber defense plan (
see
National Security Agency, national cyber defense activities); natural gas system cyber breach,
[>]
; network forensics,
[>]
; 9/11 and the executive order,
[>]
–
[>]
; Office of General Counsel,
[>]
,
[>]
; PDD-
[>]
plans,
[>]
,
[>]
n.
[>]
; personnel deployed to war,
[>]
; personnel working on cyber defense,
[>]
; privacy issues,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
(
see also
National Security Agency, distrust of); Product Line,
[>]
–
[>]
; Signals Intelligence Directorate,
[>]
,
[>]
,
[>]
,
[>]
; Special Collection Service,
[>]
–
[>]
; Special Source Operations,
[>]
–
[>]
,
[>]
–
[>]
; Starburst/Stellar program,
[>]
; System and Network Interdisciplinary Program,
[>]
; TAO unit (
see
Tailored Access Operations); threat signature compilation,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
(
see also
Defense Industrial Base); track-the-hacker programs,
[>]
–
[>]
; trainees,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; Tranche 2 plan,
[>]
–
[>]
,
[>]
; Transgression Branch,
[>]
; war games,
[>]
–
[>]
; zero day exploit stockpiling,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

National Security Agency (NSA), communications monitoring: Afghanistan,
[>]
,
[>]
–
[>]
; Chinese university,
[>]
–
[>]
; code words used by,
[>]
,
[>]
n.
[>]
; contact chaining/call chains,
[>]
,
[>]
,
[>]
–
[>]
; domestic,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; global,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; Iraq,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; legal issues (
see
under
legal issues); Libya,
[>]
; Mexico,
[>]
–
[>]
; Pakistan,
[>]
; Real Time Regional Gateway,
[>]
–
[>]
; Syria,
[>]
; tapping,
[>]
,
[>]
,
[>]
,
[>]
; Tutelage scanning system,
[>]

National Security Agency (NSA), national cyber defense activities: bid for position of authority,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; early coordination,
[>]
–
[>]
,
[>]
; loss of authority,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; and Obama,
[>]
,
[>]
–
[>]
; proposal to Bush,
[>]
–
[>]
,
[>]
,
[>]

National Security Council (NSC),
[>]
–
[>]
,
[>]

NATO,
[>]
,
[>]
,
[>]
,
[>]

natural gas systems,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]

Navy SEALs,
[>]
,
[>]

NetWitness software,
[>]

network forensics,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

Neuberger, Anne,
[>]

New York Times
,
[>]
–
[>]

NexGen,
[>]
–
[>]

Next Generation Cyber Initiative,
[>]

Nieto, Enrique Peña,
[>]

9/11 attacks,
[>]
–
[>]
,
[>]
,
[>]
,
[>]

NIST.
See
National Institute of Standards and Technology

North Africa,
[>]
–
[>]
,
[>]

North Korea,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Northrop Grumman,
[>]
,
[>]
,
[>]
,
[>]

NSA.
See
National Security Agency

NSC.
See
National Security Council

nuclear facilities,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
.
See also
Stuxnet program

 

Obama, Barack: China relations,
[>]
,
[>]
–
[>]
; critical infrastructure executive orders,
[>]
–
[>]
,
[>]
,
[>]
; cyber security as a top priority,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
; homeland security executive order,
[>]
; and the Mandiant report,
[>]
–
[>]
,
[>]
–
[>]
; and the NSA,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; PDD-
[>]
presidential directive,
[>]
,
[>]
n.
[>]
; security briefing with McConnell,
[>]
–
[>]
,
[>]

Obelisk,
[>]
,
[>]

Office of the Director of National Intelligence,
[>]
,
[>]
,
[>]

operations, cyber warfare: black bag jobs,
[>]
,
[>]
,
[>]
; Buckshot Yankee,
[>]
–
[>]
,
[>]
; Flatliquid,
[>]
–
[>]
,
[>]
n.
[>]
; Freedomnet,
[>]
; Ironavenger,
[>]
; natural gas system investigation,
[>]
–
[>]
,
[>]
; Operation Aurora (
see
China, cyber campaign against the US); Operation b54,
[>]
,
[>]
; Operation Byzantine Foothold,
[>]
; Shifting Shadow,
[>]
–
[>]
; Stuxnet,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; Tranche 2 plan,
[>]
–
[>]
,
[>]
; Turbulence program,
[>]

Outlook e-mail,
[>]
,
[>]

 

Packeteer software,
[>]

Pakistan,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

Palantir Technologies,
[>]
,
[>]

Other books

The Mystery Off Glen Road by Julie Campbell
Zeuglodon by James P. Blaylock
Leslie's Journal by Allan Stratton
Alys, Always by Harriet Lane
Photo, Snap, Shot by Joanna Campbell Slan
Hull Zero Three by Greg Bear
Terror at Hellhole by L. D. Henry
A Love to Live For by Heart, Nikita