@War: The Rise of the Military-Internet Complex (45 page)

Read @War: The Rise of the Military-Internet Complex Online

Authors: Shane Harris

Tags: #Computers, #Non-Fiction, #Military, #History

BOOK: @War: The Rise of the Military-Internet Complex
10.73Mb size Format: txt, pdf, ePub

Panetta, Leon,
[>]
,
[>]
,
[>]
–
[>]

password security: bypass of (
see
backdoors); capture of,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; flimsy password,
[>]
; long/harder-to-guess password,
[>]

patent rights,
[>]

“patient zero,”
[>]
,
[>]

PayPal,
[>]

PDD-20, rules of combat,
[>]
–
[>]
,
[>]
n.
[>]

pdf documents,
[>]
–
[>]

Pentagon,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

People's Liberation Army,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
.
See also
Unit 61398/APT1

Petraeus, Gen. David,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]

petroleum power systems,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
.
See also
critical infrastructures

phones.
See
cell phones; telecommunications entries

Polarbreeze,
[>]

political activists.
See
activists, political

political analysis,
[>]
,
[>]

Pretty Good Privacy program,
[>]

Prism data collection,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

privacy issues: anonymity,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; cyber espionage of Americans,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; electronic signatures,
[>]
; government surveillance,
[>]
,
[>]
–
[>]
,
[>]
; medical data,
[>]
,
[>]
,
[>]
; Supreme Court ruling,
[>]
; use of term,
[>]
.
See also
National Security Agency, privacy issues

private sector: alliance with DHS,
[>]
–
[>]
; alliance with the NSA,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
(
see also
Defense Industrial Base; Prism data collection); as bait to catch hackers,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; better pay than the military,
[>]
,
[>]
,
[>]
–
[>]
; boutique firms,
[>]
,
[>]
,
[>]
,
[>]
; cyber arms market,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
; cyber espionage against (
see
intellectual property); cyber security businesses,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
–
[>]
(
see also
specific companies); cyber security by,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
, 225–26; DOD contractors (
see
contractors, defense); at government classified threat briefings,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; marketing of cyber security,
[>]
–
[>]
; mercenaries,
[>]
–
[>]
,
[>]
; military-Internet complex,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
; percent of computer networks owned by,
[>]
; retaliation by,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
.
See also
legal issues, private sector retaliation

Product Line,
[>]
–
[>]

propaganda,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

Prophet collection “platform,”
[>]
,
[>]
,
[>]

public disclosure, reasons against,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
.
See also
documents/information, declassified; private sector, at government classified threat briefings

 

quarantine, e-mail,
[>]
,
[>]

Qwest Communications,
[>]
–
[>]
,
[>]

 

random number generator,
[>]
–
[>]
,
[>]

Raytheon,
[>]
,
[>]
,
[>]
,
[>]
–
[>]

reachback,
[>]
,
[>]

real-time data,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Real Time Regional Gateway (RTRG),
[>]
–
[>]

release authority,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Remote Control System,
[>]
–
[>]

Remote Operations Center (ROC),
[>]
,
[>]

Rogers, Vice Adm. Michael,
[>]

Romania,
[>]

Rouland, Chris,
[>]
–
[>]
,
[>]

routing systems,
[>]
–
[>]
,
[>]
,
[>]

RSA,
[>]
–
[>]
,
[>]

RTRG.
See
Real Time Regional Gateway

Russia,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]

Rustan, Pedro,
[>]
–
[>]

 

Saddam Hussein,
[>]
,
[>]
,
[>]

SAIC,
[>]
,
[>]
,
[>]

satellites,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

Saudi Arabia,
[>]
,
[>]

Schaeffer, Richard,
[>]

Schneier, Bruce,
[>]
–
[>]

Schriever Wargame,
[>]
–
[>]
,
[>]
–
[>]

Schuh, Justin,
[>]

“secret sauce.”
See
Alexander, Gen. Keith, bid for NSA's authority by

“secure sockets layer” service,
[>]

selector, within communications metadata,
[>]

servers: Citadel, takeover by Microsoft,
[>]
; command-and-control,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; destruction,
[>]
–
[>]
; as drop point,
[>]
–
[>]
,
[>]
; of e-mail service,
[>]
; imposter, during military breach,
[>]
,
[>]
; NSA,
[>]
,
[>]
; shutdown,
[>]
; Tor,
[>]

Shifting Shadow program,
[>]
–
[>]

SIGINT.
See
signals intelligence

SIGINT Enabling Project,
[>]
,
[>]

Signals Intelligence Directorate,
[>]
,
[>]
,
[>]
,
[>]

signals intelligence (SIGINT),
[>]
,
[>]
,
[>]
,
[>]
,
[>]

signature (hacker methods).
See
threat signature

signature (written name),
[>]

Silk Road,
[>]

sinkholing,
[>]

SkyDrive,
[>]

Skype,
[>]

Snort,
[>]

Snowden, Edward: background,
[>]
–
[>]
; information released by,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
n.
[>]

software: antivirus,
[>]
; cybersecurity,
[>]
; cyber targeting,
[>]
; data filtering,
[>]
; data mining,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; distributed computing,
[>]
,
[>]
; to fend off automated probes,
[>]
; geo-location,
[>]
; malicious (
see
malware; spyware); network forensics,
[>]
,
[>]
–
[>]
,
[>]
; patches and updates for,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; and secret/illegal access (
see
backdoors)

software manufacturers,
[>]
,
[>]
,
[>]
.
See also
specific companies

Sourcefire,
[>]
–
[>]

Soviet Union.
See
Russia; Cold War

spear-phishing,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
.
See also
e-mail, posing as legitimate

Special Operations Command,
[>]
,
[>]
–
[>]
,
[>]

spyware: camera/microphone activation by,
[>]
,
[>]
,
[>]
; by China (
see
China, cyber campaign against the US); installation (
see
spyware, vehicles for); keystroke monitoring,
[>]
,
[>]
,
[>]
,
[>]
; sold by private companies,
[>]
–
[>]
; and spear-phishing,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; used by FBI,
[>]
,
[>]
–
[>]
; used by TAO,
[>]
–
[>]

spyware, vehicles for: e-mail,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
; links,
[>]
; software updates,
[>]
–
[>]
,
[>]
,
[>]
; thumb drive,
[>]
,
[>]
,
[>]
–
[>]

Stasio, Bob,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]

Stellar Wind program,
[>]
,
[>]
–
[>]

Stokes, Bruce,
[>]
–
[>]

Stratfor,
[>]
–
[>]

Stuxnet program,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
,
[>]

surveillance technology,
[>]
,
[>]
,
[>]
,
[>]

Sweden,
[>]

Syria,
[>]
,
[>]
,
[>]
–
[>]
,
[>]

 

tactics: botnets,
[>]
,
[>]
,
[>]
,
[>]
; changing nature of,
[>]
,
[>]
,
[>]
; clock skew,
[>]
; crashes,
[>]
–
[>]
,
[>]
–
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; cyber kill chain,
[>]
–
[>]
; defense,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
,
[>]
,
[>]
–
[>]
; denial-of-service attacks,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; e-mail, posing as legitimate,
[>]
,
[>]
,
[>]
(
see also
spear-phishing); firmware crash,
[>]
; fuzzing,
[>]
–
[>]
; hijacking computers/servers,
[>]
,
[>]
,
[>]
,
[>]
,
[>]
; keystroke monitoring,
[>]
,
[>]
,
[>]
,
[>]
; quarantine,
[>]
,
[>]
; redirection of traffic to NSA-controlled server,
[>]
; tagging specific computers,
[>]
; worms,
[>]
,
[>]
,
[>]
,
[>]
–
[>]
,
[>]
(
see also
Stuxnet program).
See also
hack-backs; viruses; zero day exploits

Other books

Surrendering to the Sheriff by Delores Fossen
Rapturous by M. S. Force
Worth the Wait by Caitlin Ricci & Cari Z.
A Love by Any Measure by McRae, Killian
The Reaper Virus by Nathan Barnes
The White Tower by Dorothy Johnston
Duet for Three by Joan Barfoot
Fearful Cravings by Tessa Kealey
The Adventure of Bruce-Partington Plans by Sir Arthur Conan Doyle