Authors: Fred Kaplan
exposure of,
210
â11
false data sent to monitors in,
208
,
209
Gates and,
206
Iranian confidence as target of,
208
Israel and,
207
Natanz centrifuges targeted by,
203
Siemens logic controllers infected by,
204
â5,
211
successes of,
209
â10
TAO and,
205
â7
valve controls overridden by,
207
â20
Summers, Lawrence,
200
Suter,
161
Swire, Peter,
239
â40,
243
â44,
251
,
253
,
255
Sylvania Labs,
14
â15
Syria:
cyber attacks by,
4
Israeli bombing of reactor in,
160
â61,
198
,
301
n
Taiwan,
224
Tallinn, Estonia,
165
cyber attack on,
162
â64
Tango, Operation,
111
TAO (Office of Tailored Access Operations),
135
â37,
156
,
158
,
182
,
195
,
273
n
hacking software of,
136
Hayden and,
135
Minihan and,
134
â35
Snowden leaks and,
229
â30
Stuxnet and,
205
â7
tools and techniques of,
298
n
Technical Advisory Group,
126
telecom companies:
metadata collection and,
194
,
247
,
248
,
253
,
263
Snowden leaks and,
234
telecommunication networks, switches in,
44
â45
Tenenbaum, Ehud (The Analyzer),
77
,
78
terrorism, terrorists:
Bush (G.W.) administration complacency about,
140
â41
CNE and,
139
cyber attacks by,
98
FISA and,
192
infrastructure as targets of,
39
,
41
,
42
,
53
Internet and,
35
Obama's focus on,
197
â98
post-9/11 fear of,
195
Thompson, Fred,
95
thumb drives, malware on,
182
,
207
,
304
n
Thurman, Max,
145
Titan Rain,
224
Toyota Prius, hacking of,
273
n
Transportation Department, U.S., North Korean cyber attack on,
213
Treasury Department, U.S.:
cyber security as low priority of,
172
â73
North Korean cyber attack on,
213
“Trilateral Memorandum Agreement,” 216â17
Truman, Harry,
12
Unit 8200 (Israel),
161
United States:
Chinese relations with,
221
â28
as digital communications hub,
191
â92,
193
,
248
see also
five eyes
university computers, as entry points for hackers,
61
,
73
,
82
UNIX operating system, Sun Solaris vulnerability in,
73
â74
U.N. Security Council,
58
USA Freedom Act (2015),
263
USA Patriot Act,
see
Patriot Act
“U.S. Cyber Operations Policy” (PPD-20),
217
â20,
228
,
314
n
â15
n
“U.S. Policy on Counterterrorism” (PDD-39),
39
â40,
46
,
89
Vatis, Michael,
46
VeriSign, bandwidth map of,
191
,
193
Vessey, John “Jack,” 2,
6
,
7
,
19
,
287
n
â88
n
VirusBlokAda,
210
voice encryption,
36
â37
Walmart,
52
Ware, Willis,
8
â9,
10
,
17
,
34
,
51
,
54
,
241
,
276
WarGames
(film),
1
â3,
6
,
9
â10,
19
,
32
,
42
,
59
,
65
,
77
,
94
,
175
,
287
n
Washington Post,
228,
241
,
288
n
â89
n
weapons of mass destruction (WMDs),
74
Weaver, Andrew,
108
Wells, Linton,
44
West Point, U.S. Military Academy at,
148
Wilhelm, Richard,
22
,
33
,
42
,
48
,
97
in Critical Infrastructure Working Group,
40
â41
as NSA director of information warfare,
32
,
40
World Trade Center:
9/11 attack on,
141
,
171
,
174
,
241
1993 bombing of,
35
World War I,
11
see also
Internet
Wright-Patterson Air Force Base, cyber attack on,
78
â79,
84
Wyden, Ron,
232
â33
Y2K crisis,
99
Yeltsin, Boris,
87
Zatko, Peiter (Mudge),
91
â95,
98
,
102
â4,
274
zero-day vulnerabilities,
137
,
206
Obama policy on exploiting of,
260
â61
Review Group recommendations for,
25
Simon & Schuster
1230 Avenue of the Americas
New York, NY 10020
Copyright © 2016 by Fred Kaplan
All rights reserved, including the right to reproduce this book or portions thereof in any form whatsoever. For information, address Simon & Schuster Subsidiary Rights Department, 1230 Avenue of the Americas, New York, NY 10020.
First Simon & Schuster hardcover edition March 2016
SIMON & SCHUSTER and colophon are registered trademarks of Simon & Schuster, Inc.
For information about special discounts for bulk purchases, please contact Simon & Schuster Special Sales at 1-866-506-1949 or
[email protected]
.
The Simon & Schuster Speakers Bureau can bring authors to your live event. For more information or to book an event, contact the Simon & Schuster Speakers Bureau at 1-866-248-3049 or visit our website at
www.simonspeakers.com
.
Book design by Ellen R. Sasahara
Jacket design by Jackie Seow
Library of Congress Cataloging-in-Publication Data
Kaplan, Fred M. Dark territory : the secret history of cyber war / Fred Kaplan. New York, NY : Simon & Schuster, 2016. | Includes bibliographical references and index.
LCSH: CyberterrorismâPreventionâUnited StatesâHistory. | BISAC:
TECHNOLOGY & ENGINEERING / Military Science. | COMPUTERS /
Security /
Viruses. | HISTORY / Military / General.
Classification: LCC HV6773.15.C97 K37 2016 | DDC 363.325âdc23 LC record available at
http://lccn.loc.gov/2015027335
ISBN 978-1-4767-6325-5
ISBN 978-1-4767-6327-9 (ebook)