Read Dark Territory Online

Authors: Fred Kaplan

Dark Territory (44 page)

BOOK: Dark Territory
10.59Mb size Format: txt, pdf, ePub
ads

“with other government agencies”:
Department of Defense,
The Department of Defense Cyber Strategy
, April 2015; quotes on 5, 14, emphasis added; see also 6,
http://www.defense.gov/home/features/2015/0415_cyber-strategy/Final_2015_DoD_CYBER_STRATEGY_for_web.pdf
. The document clarified that the government would be responsible for deterring and possibly responding only to cyber attacks “of significant consequence,” which, it added, “may include loss of life, significant damage to property, serious adverse U.S. foreign policy consequences, or serious economic impact on the United States.” The terms “significant” and “serious” remained undefined—Robert Gates's question, nine years earlier, of what kind of cyber attack constitutes an act of war remained unanswered—but the finesse reflected an understanding that all such questions are ultimately political, to be decided by political leaders. It also reflected the inescapable fact that this was not just dark but untrod territory.

“How do we increase”:
Ellen Nakashima, “Cyber Chief: Efforts to Deter Attacks Against the US Are Not Working,”
Washington Post
, March 19, 2015.

“probably one or two”:
Patricia Zengerle, “NSA Chief Warns Chinese Cyber Attack Could Shut U.S. Infrastructure,” Reuters, Nov. 21, 2014,
http://www.reuters.com/article/2014/11/21/usa-security-nsa-idUSL2N0TB0IX20141121
.

“The American public”: Liberty and Security in a Changing World:
President's Review Group, 62.

INDEX

A note about the index:
The pages referenced in this index refer to the page numbers in the print edition. Clicking on a page number will take you to the ebook location that corresponds to the beginning of that page in the print edition. For a comprehensive list of locations of any word or phrase, use your reading system's search function.

Abizaid, John,
159
,
173

cyber warfare as priority of,
145
–48,
149
–50

Abkhazia,
164
–65

Abraham Lincoln,
USS,
147

Absolute Weapon, The
(Brodie),
277

Adelson, Sheldon,
265
–66,
267

Afghanistan,
147
,
182
,
199
,
229

U.S. war in,
208

Against All Enemies
(Clarke),
240

agent.btz (computer worm),
182

Air Combat Command, Information Warfare Branch of,
107
,
110

Air Force, U.S.,
64
,
70
,
79

Office of Special Investigations of,
85
,
87

Air Force Cryptology Support Center,
62

Air Force Information Operations Center,
225

Air Force Information Warfare Center (Air Intelligence Agency),
7
,
32
,
58
–59,
85
,
107
,
108
,
110
,
111
,
112
,
122
–23,
126
,
137
,
161
,
176
,
212
,
223
,
225
,
292
n
–93
n,
296
n

Computer Emergency Response Team of,
62
–63,
69
,
73

demon-dialing counter-C2 plan of,
59
,
64

Network Security Monitoring program of,
60
–61,
62

Air Force Scientific Advisory Board,
51

Air Force Systems Command,
50

Alexander, Keith,
148
–49,
173
,
213

as Army deputy chief of staff for intelligence,
149
–50

as Army Intelligence and Security commander,
148
,
152
,
154
–55,
196

BuckShot Yankee and,
182
–84

CNE and,
180

as CyberCom head,
189
,
211

cyber warfare expertise of,
149
,
157
–58

Hayden's conflicts with,
152
–53,
154
–55

infrastructure security and,
280
–82

metadata and,
230
,
231
,
233
,
253
,
256

as NSA director,
152
,
155
–56,
174
,
178
–81,
182
–84,
185
–86,
187
,
189
,
204
,
211
,
214
,
231
,
244
,
247
,
252
,
253
,
256

Obama information-sharing bill opposed by,
281
–82

PRISM and,
247

and Snowden leaks,
231

Stuxnet attack and,
204
–5,
206

Turbulence and,
157
–58

al Qaeda,
140
,
142
–43,
147
,
151
,
171
,
192
,
197
,
240
–41,
245

U.S. drone strikes on,
201
,
208

Amazon,
102

American Civil Liberties Union (ACLU),
239

American Electrical Power Company,
167

Anderson, Jack,
288
n
–89
n

Andrews, Duane,
54

Andrews Air Force Base, cyber attack on,
73
,
74

AntiOnline,
77

AOL, PRISM and,
247

Apple, PRISM and,
247

Aristide, Jean-Bertrand,
58
,
59

Army, U.S.,
70
,
79
,
151

Intelligence and Security Command of,
148
,
152
–55,
196

Land Information Warfare Activity of,
32
,
123

Army Intelligence Center,
148
–49

ARPANET,
7
–9,
276

Arquilla, John,
291n

ASD(C3I),
6
,
20
,
54
,
119
,
125

Asia Society, Donilon's speech at,
221
–22,
226
–27

Assad, Bashar al-,
160
–61,
198

Assante, Michael,
166
–67

@stake,
103

Aurora Generator Test,
166
–69,
171
,
174
,
204
,
206
,
241

Australia,
see
five eyes

auto industry,
199

automobiles, hacking of computers in,
273
n
–74
n

back doors,
8
,
37
,
73
,
93
,
235
,
257

Baghdad,
22

Balad Air Base, Iraq,
159

Balkans, 1999 NATO bombing of,
112
–14,
115
,
119
,
161

banking industry:

cyber attacks and,
104
,
275

cyber security as low priority of,
175

2008 crisis in,
199

Basra,
22

Bates, John,
250

Baywatch
(TV show),
112

beacons (cyber tracking code),
83
,
181
–82,
207

Beers, Rand,
46
,
48
,
49
,
89
,
95
,
97

Bejtlich, Richard,
137
,
223

Bell Corporation,
44

Bellknap, Lloyd,
62

Berger, Sandy,
89
,
96

bin Laden, Osama,
89
,
90
,
140
,
142
–43

killing of,
239

Black, William,
132
,
156
,
219

Black Chamber,
11

Bloomberg Businessweek,
268

BND,
235

BNN,
95

Boeing,
132

Booz Allen Hamilton,
132
,
172
,
173
,
176

Border Gateway Protocol,
93

Bosnia-Herzegovina,
110
–11,
146

Bremer, L. Paul,
147

Brezhnev, Leonid,
12

Broderick, Matthew,
1
,
59

Brodie, Bernard,
277
,
278

Brooks, Jack,
20
,
34

Brown, Michael,
187
–88

Bryan, James D.,
122
,
147

Buckshot Yankee,
185
,
207
,
276

Alexander and,
182
–84

Bush, George H. W.,
21
,
24
,
44
,
66

Bush, George W.,
3
,
103
,
171
,
173
,
175
–76,
216
,
225
,
304
n
–5
n

FISA revision and,
193
,
195

Iraq insurgency and,
150

Iraq invasion and,
142
–43,
145
,
147

Iraq troop surge ordered by,
158
,
173

McConnell's cyber warfare briefing of,
173
–75,
187

NSPD-54 of,
178
,
199

Obama's Stuxnet briefing by,
203

Stellar Wind and,
155
n

Stuxnet and,
203
,
205
,
206
,
208
,
209
,
212
,
215

in 2000 election,
103
,
139
–40

Bush (G.W.) administration:

cyber security as viewed in,
140
–41

cyber warfare and,
3

terrorism as low priority of,
140
–41

warnings on al Qaeda ignored by,
240
–41

Butler, Robert,
279

Campbell, John “Soup,” 70–71,
110
–11,
121
,
122

JTF-CND headed by,
81
–82,
83
–84,
88

Canada,
see
five eyes

Cannon, Lou,
287
n
–88
n

Carter, Ashton,
283

Carter, Jimmy,
13
,
15
,
59

Cartwright, James,
219

Casablanca
(film),
234
–35

Casey, William,
27

Central Command, U.S.,
145
–46,
147
–48,
149
,
152
,
207
,

cyber attack on,
181
–84,
185

Central Intelligence Agency (CIA),
6
,
27
,
45
,
49
,
126
,
146
,
147
,
151
,
185
,
229
,
238
–39

civil liberties abuses by,
192

Critical Defense Technologies Division of,
7

Hayden as director of,
215

Information Operations Center of,
113
,
134
,
161
,
207

NSA interaction with,
133
–34

Cerf, Vint,
102
,
103

Charney, Howard,
235

Cheney, Dick,
24
,
140
,
174
,
203
–4

Chilton, Kevin,
183

China:

information warfare and,
224

U.S. hacking of computer systems in,
227
–28,
229

U.S. relations with,
221
–28

China, cyber warfare by,
4
,
85
n,
198,
213
,
220
,
221
–28,
242
,
269

financial theft in,
224
,
227

Google attack of,
234

intellectual property and trade secrets as targets of,
224
–27,
308
n

Obama and,
221
–28,
235

see also
People's Liberation Army

Christopher, Warren,
12
–13

Church, Frank,
37
,
192
,
285

Church Committee,
37
,
230
,
252

“CIA Eavesdrops on Kremlin Chiefs” (Anderson),
288
n
–89
n

Cisco,
137
,
235

Citibank, Russian hackers' attack on,
42

civil liberties:

intelligence community and,
251
–52,
259
,
260

NSA and,
3
,
20
,
188
,
192
,
194
–96,
231
,
239
,
244
–52,
264

Protect America Act and,
194
–95

Stone and,
239
,
244
,
251
,
259
,
264

Civil War, U.S.,
4

Clapper, James,
231
–33

BOOK: Dark Territory
10.59Mb size Format: txt, pdf, ePub
ads

Other books

Follow You Home by Mark Edwards
Queen Sugar: A Novel by Baszile, Natalie
One or the Other by John McFetridge
From the Grounds Up by Sandra Balzo
Just One Wish by Janette Rallison
Crotch Rocket: A Bad Boy Motorcycle Club Romance by Natasha Tanner, Amelia Clarke
Sweat by Mark Gilleo
Wanderlust by Thea Dawson