Dark Territory (49 page)

Read Dark Territory Online

Authors: Fred Kaplan

BOOK: Dark Territory
7.9Mb size Format: txt, pdf, ePub

critical infrastructure hearings of,
47
–48

Obama, Barack,
186
,
187
,
197
–98,
201
,
249
,
259
,
304
n
–5
n

Bush's Stuxnet briefing of,
203

Chinese cyber attacks and,
221
–28,
235

and cyber attack on Sony,
270
–71

cyber security as priority of,
200
–201

drone strikes supported by,
208

“Improving Critical Infrastructure Cybersecurity” executive order of,
274

intelligence review panel appointed by,
see
President's Review Group on Intelligence and Communication Technologies

PPD-20 of,
217
–20,
228
,
314
n
–15
n

Stuxnet and,
203
,
208
–9,
210
,
212

terrorism as priority of,
197
–98

Xi's summits with,
228
–29,
308
n

Obama administration:

cyber warfare and,
3
–4

metadata “white paper” of,
238

Odom, William,
26
,
28

Office of Technology Assessment, U.S.,
43

Oklahoma City bombing,
39
,
40
,
89
,
175

Olympic Games, Operation,
see
Stuxnet

Orchard, Operation,
161

Pace, Peter,
211

Pacific Command, U.S.,
67
,
80

Pacific Gas & Electric,
52
–53

Pakistan, U.S. drone strikes in,
201
,
208

Paladin Capital Group,
233

Paltalk, PRISM and,
247

Panetta, Leon, as defense secretary,
220

Parkes, Walter,
9
–10,
32

passwords,
82
,
136

Patriot Act (2001),
192

Section 215 of,
245
–46,
252
–53,
261
–63

Section 505 of,
254

sunset clause in,
261
–63

Paulson, Henry,
174
,
175

PDD-39 (“U.S. Policy on Counterterrorism”),
39
–40,
46
,
89

PDD-63,
see
“Critical Infrastructure Protection” (PDD-63)

Pentagon,
9
/11 attack on,
141

People's Liberation Army, Unit 61398 of,
222
–23,
225
,
226
,
242
,
269

Perry, William,
14
–15,
67
,
76
,
124
,
184
,
220

as secretary of defense,
57
–58,
59
,
66
–67,
120

Persian Gulf,
74

Petraeus, David,
158
–59,
160
,
173

phishing,
136

Physical Vulnerability of Electric Systems to Natural Disasters and Sabotage
(U.S. Office of Technology Assessment),
43
–44

PlayStation network, hacking of,
268

Poitras, Laura,
229

Polaris missile,
120

Pollard, Neal,
75

Powell, Colin,
23
,
30
,
32
,
59
,
64

Power, Samantha,
239

PPD-20 (“U.S. Cyber Operations Policy”),
217
–20,
228
,
314
n
–15
n

President Reagan: The Role of a Lifetime
(Cannon),
287
n
–88
n

President's Commission on Critical Infrastructure Protection,
49
–55,
74

Marsh as chairman of,
50

members of,
49
–50

Minihan's Eligible Receiver briefing to,
72

report of,
see
Marsh Report (
Critical Foundations
)

President's Review Group on Intelligence and Communication Technologies (Review Group),
235
,
238
–40,
242
–60,
264

cyber security prioritized by,
257
–58

deadline of,
242

FBI's briefings of,
254
–55

K Street SCIF of,
243
,
252

NSA metadata collecting examined by,
245
–47,
252
–54,
262

Obama's meetings with,
242
,
259

and potential for abuse by intelligence agencies,
251
–52,
259
,
260

PRISM and,
247
–48

public trust as priority of,
237
–38,
258

report of,
see Liberty and Security in a Changing World

staff of,
243
,
258

PRISM,
228
,
247
–52

FISA Court and,
248
,
249
–50

programmable logic controllers (PLCs),
204
–5

Protect America Act (2007),
193
–95

civil liberties and,
194
–95

Section 702 of,
248
–49

Putin, Vladimir,
162

RageMaster,
136

RAND Corporation,
8
,
10
,
51
,
278
,
316
n

RATs (Remote Access Trojans),
225
–26

Rattray, Gregory,
225

RCA,
19

Reagan, Ronald,
7
,
19
,
27
,
67
,
72
,
183
,
287
n

counter-C2 warfare and,
15
–16

Executive Order 12333 of,
288
n

NSDD-145 of,
2
–3,
7
,
19
–20,
27
,
34
,
54
,
67
,
72
,
100
,
188
,
195
,
241

“Star Wars” program and,
2

WarGames
and,
1
–3,
6
,
10
,
19
,
175

Reagan administration,
54

cyber warfare and,
1
–3,
6
–7

Redford, Robert,
31

regulation, corporate fear of,
98
–99,
101
,
176
,
200
,
274
–75

Remote Access Trojans (RATs),
225
–26

Reno, Janet,
39
–40

resilience, as goal of cyber security,
277

Review Group,
see
President's Review Group on Intelligence and Communication Technologies

Rhoads, Walter “Dusty,” 107–8,
120
,
121

Rice, Condoleezza,
140
–41,
150
,
174

Rice, Susan,
238
,
239

Riedel, Bruce,
199

Rogen, Seth,
269
,
270

Rogers, Michael,
282
,
285

Ronfeldt, David,
291
n

RTRG (Real Time Regional Gateway),
158
–60,
195

Rumsfeld, Donald,
150
–51,
155
,
173

Iraq insurgency downplayed by,
148
,
150

Russian Federation:

CentCom hacking and,
182

and cyber attack on Georgia,
164
–66

cyber attacks by,
4
,
42
,
164
–66,
224

Estonian cyber attack and,
163
–64,
165

Georgia invaded by,
164
–66

Moonlight Maze and,
86
–88,
213
,
223

Sandia Laboratories,
111

Sare, Michael,
71

Saudi Aramco, Iranian cyber attack on,
213
,
216

SCADA (Supervisory Control and Data Acquisition) systems,
45

Schaeffer, Richard,
181
–82,
276

Schell, Roger,
293
n

Schmidt, Howard,
188

Schoomaker, Peter,
150
–51

Schwarzkopf, Norman,
23
,
25
,
151

Science Applications International Corporation (SAIC),
132

Scowcroft, Brent,
44

2nd Circuit Court of Appeals, U.S., Section 215 ruling of,
262
–63

Secret Service, North Korean cyber attack on,
213

“Security and Privacy in Computer Systems” (Ware),
8
–9

Senate, U.S.:

Armed Services Committee of,
46
,
71
,
283

Church Committee of,
37
,
230
,
252

Foreign Relations Committee of,
197

Governmental Affairs Committee of,
48
,
94

Intelligence Committee of,
35
–36

Select Committee on Intelligence of,
126
,
127
,
231
–33,
256

sensitive compartmented information facilities (SCIFs),
243

September 11, 2001, terrorist attacks,
3
,
140
–41,
155
,
171
,
174
,
192
,
195
,
241
,
244
,
261

Serbia, U.S. hacking of phone systems in,
113
,
132

Shady RAT, Operation,
226

Shalikashvili, John,
67
,
68
,
146

Shamoon computer virus,
213
–14

Shaw Air Force Base,
7
,
108
–9

Shiite Muslims,
147
,
160

Shinseki, Eric,
111
,
112

Siemens, logic controllers of,
204
–5,
206
,
211

Signal Security Agency,
11

609th Information Warfare Squadron,
7
,
108
–10,
120

60 Minutes
(TV program),
240

Skype, PRISM and,
247

Slocombe, Walter,
44

Sneakers
(film),
31
–32,
33

Snowden, Edward,
194

NSA programs leaked by,
63
–64,
228
–30,
231
,
234
,
242
,
244
,
245
,
251
,
257
–59,
262
,
282
,
285
,
298
n

Social Security,
99

Social Security numbers, hacking of,
265
,
268

Solar Sunrise cyber attack,
74
–78,
80
,
81
,
98
,
101
,
119
,
120
,
123
,
183
,
187
,
241

Sonic.net,
77

Sony Online Entertainment, hacking of,
268

Sony Pictures Entertainment, North Korean cyber attack on,
268
–71,
272
n

South China Morning Post,
229

South Korea, North Korean cyber attacks on,
213
,
269

South Ossetia,
164
–65,
241

Soviet Union,
12
,
13

collapse of,
162

Space Command, U.S.,
122
,
146

Spiegel, Der
228,
229
,
298
n

Sputnik II,
119

Stabilization Force (SFOR),
110
–12

“Star Wars” program,
2

Stasi,
235

Stellar Wind,
155
n

Stimpy (pseudonym),
77
–78

Stimson, Henry,
11

Stoll, Cliff,
61
–62,
82
–83

Stone, Geoffrey:

civil liberties expertise of,
239
,
244
,
251
,
259
,
264

in Review Group,
239
,
244
,
246
,
250
–52,
253
,
254
,
264

Strategic Command, U.S.,
183

Studeman, William,
21
–22,
26
,
27
,
28
,
30
,
42
,
84
,
128

as acting CIA director,
45

as CIA deputy director,
41

information warfare as focus of,
41

as NSA director,
126
–27,
275
–76

Stuxnet,
201
,
213
,
216
,
217
,
218
–19,
228
,
242
,
304
n
–5
n

Alexander and,
204
–5,
206

Bush and,
203
,
205
,
206
,
208
,
209
,
212
,
215

centrifuges speed manipulated by,
209

Other books

Mary, Queen of Scots by Weir, Alison
The GI Bride by Simantel, Iris Jones
A Heart Once Broken by Jerry S. Eicher
Beauty in His Bed by L. K. Below
La noche de los tiempos by Antonio Muñoz Molina
Impossibly Tongue-Tied by Josie Brown