Dark Territory (48 page)

Read Dark Territory Online

Authors: Fred Kaplan

BOOK: Dark Territory
9.77Mb size Format: txt, pdf, ePub

USA Freedom Act and,
263

Microsoft,
234
,
247

Microsoft Windows,
92
,
93

microwave technology, espionage and,
12
–13,
16
–17,
22
,
132
–33,
289
n

military, U.S.,
121

classified networks of,
276

cyber security as low priority of,
64
,
105
,
119
,
120

cyber warfare resisted by,
117
–18,
119
,
120

Solar Sunrise cyber attack on,
74
–78,
183

Military Intelligence Branch 8 (MI-8),
11

military networks, limited Internet connectivity to,
212

Miller, Charlie,
273
n
–74
n

Miller, James,
279

Milosevic, Slobodan,
110
,
207

information warfare campaign against,
112
–18

Mimikatz,
266

Minihan, Kenneth,
74
,
75
,
90
,
107
,
108
,
161
,
184
,
205
,
233
,
245

as Air Force Information Warfare Center commander,
58
–59,
126

as Air Force intelligence chief,
64

as Defense assistant chief of staff for intelligence,
108

as Defense Intelligence Agency director,
57

Eligible Receiver 97 and,
57
,
65
,
66
,
71

as NSA director,
57
,
58
,
64
,
122
,
123
–24,
125
–26,
127
,
128
,
129
,
131
,
157
,
179
–80

TAO and,
134
–35

Misawa Air Base, Japan,
32

MIT (Massachusetts Institute of Technology),
9
,
61
,
73

Mitchell, Andrea,
232

Money, Art,
105
,
122
,
153
,
279
,
296
n

as assistant secretary of defense,
119
,
120
,
124
–25

MonkeyCalendar,
136

Moonlight Maze Coordination Group,
86
–88

Moonlight Maze cyber attack,
78
–79,
81
–88,
98
,
119
,
123
,
187
,
212
–13,
241
,
276

Russia and,
86
–88,
213
,
223

Morell, Michael:

CIA career of,
238
–39,
252

NSA case files reviewed by,
252
–53

in Review Group,
238
–39,
252
–54,
256

Morris, Robert, Sr.,
60

Morris, Robert T., Jr.,
60

Morris Worm,
60
,
62

Moscow, U.S. embassy in,
12
,
289
n

Mossad,
207

Mudge,
see
Zatko, Peiter

Mullen, Mike,
183

Murtha, Jack,
193

Nagasaki, atomic bombing of,
215

Napolitano, Janet,
186
–89

NASDAQ, North Korean cyber attack on,
213

Natanz, Iran,
203
–4,
304
n

cyber attack on,
see
Stuxnet

National Bureau of Standards,
34
,
36

National Geospatial-Intelligence Agency,
152

National Infrastructure Protection Center,
166

National Institute of Standards and Technology,
34
,
36

National Intelligence Directorate,
176
,
242
–43

National Military Command Center, Eligible Receiver hacking of,
68
–69

National Military Strategy for Cyber Operations,
211

National Plan for Information Systems Protection,
100–105,
139
,
141
–42

“National Policy on Telecommunications and Automated Information Systems Security” (NSDD-145),
2
–3,
7
,
19
–20,
27
,
34
,
54
,
67
,
72
,
100
,
188
,
195
,
241

National Research Council,
54

National Security Agency (NSA),
6
–7,
12
–13,
18
–19,
27
,
30
–37,
54
,
74
,
78
,
100
,
110
,
119
,
122
,
123
–40,
147
,
158
,
176
,
195
,
219
,
269
,
288
n

Alexander as director of,
152
,
155
–56,
174
,
178
–81,
182
–84,
185
–86,
187
,
189
,
204
,
211
,
214
,
231
,
244
,
247
,
252
,
253
,
256

anti-Milosevic campaign and,
114
–15

Army's relations with,
151

Bauded Signals Upgrade program in,
14
,
22
,
28

broken personnel system of,
129
–30

budget cuts and,
123
,
127

CIA interaction with,
133
–34

civil liberties and,
3
,
20
,
188
,
192
,
194
–96,
231
,
239
,
244
–52,
264

Clarke's visit to,
90

CNCI and,
178

Cold War and,
12

communication service providers and,
194

computer crash at,
130
,
131

Computer Security Center of,
18
–19,
34
,
60

Congress and,
3
,
20
,
27
,
195
–96

counter-C2 campaign of,
16

Data Network Technologies Branch of,
136

digital communications data collected by,
196
–97,
228
–29,
230
–35,
237
–64

domestic surveillance by,
230
–35

in Eligible Receiver 97 cyber attack exercise,
see
Eligible Receiver 97 cyber attack exercise

executives' report on shortcomings of,
127
–28,
129
–33

as falling behind in digital technology,
126
–27,
128
,
129

Flame virus of,
213

fusion of Cyber Command and,
243
,
260

“Global Access Study” of,
28
–29,
30

Hayden as director of,
122
,
125
–26,
127
–33,
135
,
138
,
151
,
157
–59

Information Warfare Directorate of,
32
,
40

infrastructure security and,
280

IOTC of,
124
–26

Iraq teams of,
159
–60

McConnell as director of,
29
,
30
–37,
128
,
133
,
172
,
173
,
193

metadata collection and storage by,
64
,
194
–97,
230
–35,
238
,
245
–47,
252
–54,
261
–62,
263

Minihan as director of,
57
,
58
,
64
,
122
,
123
–24,
125
–26,
127
,
128
,
129
,
131
,
157
,
179
–80

Mission Infrastructure Technologies Branch of,
136

Moonlight Maze attack and,
79

mystique of,
124
,
184

NSDD-145 and,
3
,
20
,
188
,
195

“One Hundred Days of Change” at,
130

origins of,
11
–12

potential for abuse by,
251
–52,
254
,
264

PRISM program of,
247
–52

and protection of civilian infrastructure,
186
–89

Red Team of,
57
,
66
,
67
–68,
69
–71,
72
,
75
,
76
,
80
,
182
,
275

Review Group briefings by,
244
–52

Review Group recommendations on,
256
–57

Rogers as director of,
282

RTRG program of,
158
–60

Scientific Advisory Board of,
11

secrecy of,
3
,
178
,
214
–15,
234

security complacency at,
17
,
34

Snowden leaks and,
64
,
194
,
228
–30,
234
,
242
,
244
,
245
,
251
,
257
–59,
262
,
282
,
285
,
298
n

Stellar Wind program of,
155
n

Stone's speech to,
264

Studeman as director of,
126
–27,
275
–76

Telecommunications Network Technologies Branch of,
136

Trailblazer program of,
132
,
156
–57

Turbulence program of,
157
–58

National Security Agency (NSA), SIGINT Directorate of,
4
–5,
18
,
22
,
29
,
30
,
33
,
34
,
90
,
93
,
125
,
128
,
130
–31,
133
,
172
,
181
,
204
,
205
,
207
,
257

A Group of,
124
,
129

changing role of,
214
–15

“Global Network” operations of,
131

“Global Response” operations of,
131

ground commanders and,
156
,
185

Tailored Access Operations of,
see
TAO

National Security Council (NSC),
40
,
97
,
140
,
150
,
187
,
188
,
227

National Security Directive 42,
66

National Security Letters,
254
–55,
260

Review Group recommendations for,
256

National Strategy to Secure Cyberspace, The,
141–42,
174
,
199

Naval Postgraduate School,
148

Navy, U.S.,
70
,
79

black programs of,
40
,
44

cryptology labs of,
7

intelligence operations of,
14
,
26
–27

Naval Information Warfare Activity of,
32
,
123

Nellis Air Force Base,
107

Netscape Matrix,
35

Network Security Monitoring,
60
–63

Neumann, John von,
8

Neuromancer
(Gibson),
45
–46

New York, N.Y., telecommunication switches in,
45

New York Stock Exchange, North Korean cyber attack on,
213

New York Times,
101

Chinese hacking of,
223

New Zealand,
see
five eyes

NightStand,
136

9/11 Commission,
171
,
240

Nixon, Richard,
251
–52

Noonan, Robert,
153
–54

North American Aerospace Defense Command (NORAD),
1
,
10

North Atlantic Treaty, Article 5 of,
163

North Atlantic Treaty Organization (NATO),
110
,
163
,
273

North Korea,
160
,
198
,
269

cyber warfare and,
4
,
213
,
216
,
268
–71,
272
n

Internet shutdown in,
271
–72

Sony cyber attack by,
268
–71,
272
n

Northrop Grumman Corporation,
127
,
132

NSDD-145 (“National Policy on Telecommunications and Automated Information Systems Security”),
2
–3,
7
,
19
–20,
27
,
34
,
54
,
67
,
72
,
100
,
188
,
195
,
241

NSPD-54,
178
,
199

nuclear weapons,
277
,
278

cyber warfare vs.,
215
–16

Nunn, Sam,
46
–47,
51
,
59
,
199

Other books

The Immortal Highlander by Karen Marie Moning
El libro secreto de Dante by Francesco Fioretti
The River Charm by Belinda Murrell