Authors: Fred Kaplan
USA Freedom Act and,
263
microwave technology, espionage and,
12
â13,
16
â17,
22
,
132
â33,
289
n
military, U.S.,
121
classified networks of,
276
cyber security as low priority of,
64
,
105
,
119
,
120
cyber warfare resisted by,
117
â18,
119
,
120
Solar Sunrise cyber attack on,
74
â78,
183
Military Intelligence Branch 8 (MI-8),
11
military networks, limited Internet connectivity to,
212
Miller, Charlie,
273
n
â74
n
Miller, James,
279
information warfare campaign against,
112
â18
Mimikatz,
266
Minihan, Kenneth,
74
,
75
,
90
,
107
,
108
,
161
,
184
,
205
,
233
,
245
as Air Force Information Warfare Center commander,
58
â59,
126
as Air Force intelligence chief,
64
as Defense assistant chief of staff for intelligence,
108
as Defense Intelligence Agency director,
57
Eligible Receiver 97 and,
57
,
65
,
66
,
71
as NSA director,
57
,
58
,
64
,
122
,
123
â24,
125
â26,
127
,
128
,
129
,
131
,
157
,
179
â80
TAO and,
134
â35
Misawa Air Base, Japan,
32
MIT (Massachusetts Institute of Technology),
9
,
61
,
73
Mitchell, Andrea,
232
Money, Art,
105
,
122
,
153
,
279
,
296
n
as assistant secretary of defense,
119
,
120
,
124
â25
MonkeyCalendar,
136
Moonlight Maze Coordination Group,
86
â88
Moonlight Maze cyber attack,
78
â79,
81
â88,
98
,
119
,
123
,
187
,
212
â13,
241
,
276
Morell, Michael:
NSA case files reviewed by,
252
â53
in Review Group,
238
â39,
252
â54,
256
Morris, Robert, Sr.,
60
Morris, Robert T., Jr.,
60
Moscow, U.S. embassy in,
12
,
289
n
Mossad,
207
Mudge,
see
Zatko, Peiter
Mullen, Mike,
183
Murtha, Jack,
193
Nagasaki, atomic bombing of,
215
Napolitano, Janet,
186
â89
NASDAQ, North Korean cyber attack on,
213
cyber attack on,
see
Stuxnet
National Bureau of Standards,
34
,
36
National Geospatial-Intelligence Agency,
152
National Infrastructure Protection Center,
166
National Institute of Standards and Technology,
34
,
36
National Intelligence Directorate,
176
,
242
â43
National Military Command Center, Eligible Receiver hacking of,
68
â69
National Military Strategy for Cyber Operations,
211
National Plan for Information Systems Protection,
100â105,
139
,
141
â42
“National Policy on Telecommunications and Automated Information Systems Security” (NSDD-145),
2
â3,
7
,
19
â20,
27
,
34
,
54
,
67
,
72
,
100
,
188
,
195
,
241
National Research Council,
54
National Security Agency (NSA),
6
â7,
12
â13,
18
â19,
27
,
30
â37,
54
,
74
,
78
,
100
,
110
,
119
,
122
,
123
â40,
147
,
158
,
176
,
195
,
219
,
269
,
288
n
Alexander as director of,
152
,
155
â56,
174
,
178
â81,
182
â84,
185
â86,
187
,
189
,
204
,
211
,
214
,
231
,
244
,
247
,
252
,
253
,
256
anti-Milosevic campaign and,
114
â15
Army's relations with,
151
Bauded Signals Upgrade program in,
14
,
22
,
28
broken personnel system of,
129
â30
CIA interaction with,
133
â34
civil liberties and,
3
,
20
,
188
,
192
,
194
â96,
231
,
239
,
244
â52,
264
Clarke's visit to,
90
CNCI and,
178
Cold War and,
12
communication service providers and,
194
Computer Security Center of,
18
â19,
34
,
60
counter-C2 campaign of,
16
Data Network Technologies Branch of,
136
digital communications data collected by,
196
â97,
228
â29,
230
â35,
237
â64
domestic surveillance by,
230
â35
in Eligible Receiver 97 cyber attack exercise,
see
Eligible Receiver 97 cyber attack exercise
executives' report on shortcomings of,
127
â28,
129
â33
as falling behind in digital technology,
126
â27,
128
,
129
Flame virus of,
213
fusion of Cyber Command and,
243
,
260
“Global Access Study” of,
28
â29,
30
Hayden as director of,
122
,
125
â26,
127
â33,
135
,
138
,
151
,
157
â59
Information Warfare Directorate of,
32
,
40
infrastructure security and,
280
IOTC of,
124
â26
Iraq teams of,
159
â60
McConnell as director of,
29
,
30
â37,
128
,
133
,
172
,
173
,
193
metadata collection and storage by,
64
,
194
â97,
230
â35,
238
,
245
â47,
252
â54,
261
â62,
263
Minihan as director of,
57
,
58
,
64
,
122
,
123
â24,
125
â26,
127
,
128
,
129
,
131
,
157
,
179
â80
Mission Infrastructure Technologies Branch of,
136
Moonlight Maze attack and,
79
“One Hundred Days of Change” at,
130
origins of,
11
â12
potential for abuse by,
251
â52,
254
,
264
PRISM program of,
247
â52
and protection of civilian infrastructure,
186
â89
Red Team of,
57
,
66
,
67
â68,
69
â71,
72
,
75
,
76
,
80
,
182
,
275
Review Group briefings by,
244
â52
Review Group recommendations on,
256
â57
Rogers as director of,
282
RTRG program of,
158
â60
Scientific Advisory Board of,
11
Snowden leaks and,
64
,
194
,
228
â30,
234
,
242
,
244
,
245
,
251
,
257
â59,
262
,
282
,
285
,
298
n
Stellar Wind program of,
155
n
Stone's speech to,
264
Studeman as director of,
126
â27,
275
â76
Telecommunications Network Technologies Branch of,
136
Trailblazer program of,
132
,
156
â57
Turbulence program of,
157
â58
National Security Agency (NSA), SIGINT Directorate of,
4
â5,
18
,
22
,
29
,
30
,
33
,
34
,
90
,
93
,
125
,
128
,
130
â31,
133
,
172
,
181
,
204
,
205
,
207
,
257
changing role of,
214
â15
“Global Network” operations of,
131
“Global Response” operations of,
131
Tailored Access Operations of,
see
TAO
National Security Council (NSC),
40
,
97
,
140
,
150
,
187
,
188
,
227
National Security Directive 42,
66
National Security Letters,
254
â55,
260
Review Group recommendations for,
256
National Strategy to Secure Cyberspace, The,
141â42,
174
,
199
Naval Postgraduate School,
148
cryptology labs of,
7
intelligence operations of,
14
,
26
â27
Naval Information Warfare Activity of,
32
,
123
Nellis Air Force Base,
107
Netscape Matrix,
35
Network Security Monitoring,
60
â63
Neumann, John von,
8
Neuromancer
(Gibson),
45
â46
New York, N.Y., telecommunication switches in,
45
New York Stock Exchange, North Korean cyber attack on,
213
New York Times,
101
Chinese hacking of,
223
New Zealand,
see
five eyes
NightStand,
136
Nixon, Richard,
251
â52
Noonan, Robert,
153
â54
North American Aerospace Defense Command (NORAD),
1
,
10
North Atlantic Treaty, Article 5 of,
163
North Atlantic Treaty Organization (NATO),
110
,
163
,
273
cyber warfare and,
4
,
213
,
216
,
268
â71,
272
n
Internet shutdown in,
271
â72
Sony cyber attack by,
268
â71,
272
n
Northrop Grumman Corporation,
127
,
132
NSDD-145 (“National Policy on Telecommunications and Automated Information Systems Security”),
2
â3,
7
,
19
â20,
27
,
34
,
54
,
67
,
72
,
100
,
188
,
195
,
241
cyber warfare vs.,
215
â16