Dark Territory (50 page)

Read Dark Territory Online

Authors: Fred Kaplan

BOOK: Dark Territory
2.48Mb size Format: txt, pdf, ePub

exposure of,
210
–11

false data sent to monitors in,
208
,
209

Gates and,
206

Iranian confidence as target of,
208

Israel and,
207

Natanz centrifuges targeted by,
203

Obama and,
203
,
208
–9,
210
,
212

Siemens logic controllers infected by,
204
–5,
211

successes of,
209
–10

TAO and,
205
–7

valve controls overridden by,
207
–20

Summers, Lawrence,
200

Sunni Muslims,
147
,
160

Sunstein, Cass,
239
,
253

Suter,
161

Swire, Peter,
239
–40,
243
–44,
251
,
253
,
255

Sylvania Labs,
14
–15

Symantec,
210
,
211

Syria:

cyber attacks by,
4

Israeli bombing of reactor in,
160
–61,
198
,
301
n

Taiwan,
224

Taliban,
149
,
229

Tallinn, Estonia,
165

cyber attack on,
162
–64

Tango, Operation,
111

TAO (Office of Tailored Access Operations),
135
–37,
156
,
158
,
182
,
195
,
273
n

hacking software of,
136

Hayden and,
135

Minihan and,
134
–35

Snowden leaks and,
229
–30

Stuxnet and,
205
–7

tools and techniques of,
298
n

Technical Advisory Group,
126

telecom companies:

metadata collection and,
194
,
247
,
248
,
253
,
263

Snowden leaks and,
234

telecommunication networks, switches in,
44
–45

Tenenbaum, Ehud (The Analyzer),
77
,
78

Tenet, George,
113
,
140

terrorism, terrorists:

Bush (G.W.) administration complacency about,
140
–41

CNE and,
139

cyber attacks by,
98

FISA and,
192

infrastructure as targets of,
39
,
41
,
42
,
53

Internet and,
35

Obama's focus on,
197
–98

post-9/11 fear of,
195

Thompson, Fred,
95

thumb drives, malware on,
182
,
207
,
304
n

Thurman, Max,
145

Titan Rain,
224

Toyota Prius, hacking of,
273
n

Trailblazer,
132
,
156
–57,
158

Transportation Department, U.S., North Korean cyber attack on,
213

Treasury Department, U.S.:

cyber security as low priority of,
172
–73

North Korean cyber attack on,
213

“Trilateral Memorandum Agreement,” 216–17

Truman, Harry,
12

Turbulence,
157
–58,
195

Unit 8200 (Israel),
161

United Arab Emirates,
75
,
76

United States:

Chinese relations with,
221
–28

as digital communications hub,
191
–92,
193
,
248

see also
five eyes

university computers, as entry points for hackers,
61
,
73
,
82

UNIX operating system, Sun Solaris vulnerability in,
73
–74

U.N. Security Council,
58

USA Freedom Act (2015),
263

USA Patriot Act,
see
Patriot Act

“U.S. Cyber Operations Policy” (PPD-20),
217
–20,
228
,
314
n
–15
n

“U.S. Policy on Counterterrorism” (PDD-39),
39
–40,
46
,
89

Vatis, Michael,
46

VeriSign, bandwidth map of,
191
,
193

Vessey, John “Jack,” 2,
6
,
7
,
19
,
287
n
–88
n

VirusBlokAda,
210

voice encryption,
36
–37

Walmart,
52

Ware, Willis,
8
–9,
10
,
17
,
34
,
51
,
54
,
241
,
276

WarGames
(film),
1
–3,
6
,
9
–10,
19
,
32
,
42
,
59
,
65
,
77
,
94
,
175
,
287
n

Washington Post,
228,
241
,
288
n
–89
n

weapons of mass destruction (WMDs),
74

Weaver, Andrew,
108

Wells, Linton,
44

West Point, U.S. Military Academy at,
148

White, John,
48
–49,
50

Wilhelm, Richard,
22
,
33
,
42
,
48
,
97

in Critical Infrastructure Working Group,
40
–41

as NSA director of information warfare,
32
,
40

World Trade Center:

9/11 attack on,
141
,
171
,
174
,
241

1993 bombing of,
35

World War I,
11

World War II,
4
,
11
,
215
,
278

World Wide Web,
5
,
131
,
195

see also
Internet

worms,
182
,
205
–6

Wright-Patterson Air Force Base, cyber attack on,
78
–79,
84

Wyden, Ron,
232
–33

Xi Jinping,
228
–29,
308
n

Y2K crisis,
99

Yahoo,
102
,
247

Yeltsin, Boris,
87

YouTube,
247
,
266

Zatko, Peiter (Mudge),
91
–95,
98
,
102
–4,
274

zero-day vulnerabilities,
137
,
206

Obama policy on exploiting of,
260
–61

Review Group recommendations for,
25

Simon & Schuster

1230 Avenue of the Americas

New York, NY 10020

www.SimonandSchuster.com

Copyright © 2016 by Fred Kaplan

All rights reserved, including the right to reproduce this book or portions thereof in any form whatsoever. For information, address Simon & Schuster Subsidiary Rights Department, 1230 Avenue of the Americas, New York, NY 10020.

First Simon & Schuster hardcover edition March 2016

SIMON & SCHUSTER and colophon are registered trademarks of Simon & Schuster, Inc.

For information about special discounts for bulk purchases, please contact Simon & Schuster Special Sales at 1-866-506-1949 or
[email protected]
.

The Simon & Schuster Speakers Bureau can bring authors to your live event. For more information or to book an event, contact the Simon & Schuster Speakers Bureau at 1-866-248-3049 or visit our website at
www.simonspeakers.com
.

Book design by Ellen R. Sasahara

Jacket design by Jackie Seow

Library of Congress Cataloging-in-Publication Data

Kaplan, Fred M. Dark territory : the secret history of cyber war / Fred Kaplan. New York, NY : Simon & Schuster, 2016. | Includes bibliographical references and index.

LCSH: Cyberterrorism—Prevention—United States—History. | BISAC:

TECHNOLOGY & ENGINEERING / Military Science. | COMPUTERS /

Security /

Viruses. | HISTORY / Military / General.

Classification: LCC HV6773.15.C97 K37 2016 | DDC 363.325—dc23 LC record available at
http://lccn.loc.gov/2015027335

ISBN 978-1-4767-6325-5

ISBN 978-1-4767-6327-9 (ebook)

Other books

Pearl (The Pearl Series) by Arianne Richmonde
All the Dead Fathers by David J. Walker
The Werewolf of Bamberg by Oliver Pötzsch
Nature Futures 2 by Colin Sullivan
Fucked by Force by Bree Bellucci