Inside Cyber Warfare - Jeffrey Carr [170]
Russian military doctrine and, Creating a legend for a cyber attack
Australia, cyber warfare capability, Australia
automated registration, searcher, and group creator, Owning social network users for a small budget of $300–$1,300
autonomous system (AS) network, Using Open Source Internet Data, Using Open Source Internet Data, What Is an Autonomous System Network?, What Is an Autonomous System Network?
AS numbers, What Is an Autonomous System Network?
B
BENCHMARK stored procedure, SQL injection, blind SQL injection, and using BENCHMARK
Bennett, Senator Robert, The Russian Federation
BGP, Using Open Source Internet Data (see Border Gateway Protocol)
binary file formats, Research is the key to offensive capabilities
BIOS-based rootkit attacks, BIOS-Based Rootkit Attack
Bizeuf, David, Organized Crime in Cyberspace
blind SQL injection, SQL injection, blind SQL injection, and using BENCHMARK
Border Gateway Protocol (BGP), Using Open Source Internet Data, What Is an Autonomous System Network?
routing map, What Is an Autonomous System Network?
botnets, Africa: The Future Home of the World’s Largest Botnet?, The Botnet Versus the Malware, McColo: Bulletproof Hosting for the World’s Largest Botnets
Korean DDoS attacks (2009), The Botnet Versus the Malware
McColo hosting of largest botnets, McColo: Bulletproof Hosting for the World’s Largest Botnets
Brazil, cyber warfare capability, Brazil
Bukovskaya, Anna, The Kremlin Spy for Hire Program, The Kremlin Spy for Hire Program
bulletproof networks, False Identities, SoftLayer Technologies
Burutine, Aleksandr, “Wars of the Future Will Be Information Wars”
butterfly effect, Conducting Operations in the Cyber-Space-Time Continuum
C
C-H Team, C-H Team (aka H-C Team)
Canada, cyber warfare capability, Canada
carders, McColo: Bulletproof Hosting for the World’s Largest Botnets
CCDCOE (NATO Cooperative Cyber Defense Center of Excellence), The Legal Status of Cyber Warfare
channel consolidation, Channel Consolidation
Chilton, General Kevin P., The Legal Status of Cyber Warfare
China, China, China, China, China, Are Nonstate Hackers a Protected Asset?, United States, China, China Military Doctrine, The 36 Stratagems, China Military Doctrine, China Military Doctrine, Anti-Access Strategies, The 36 Stratagems, Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec, People’s Republic of China
China Hacker Emergency Meeting Center, China
Chinese Red Hacker Alliance, China
Chinese-US aircraft collision (2001), China
cyber warfare capability, People’s Republic of China
cyber warfare incidents, China, United States
international law and, United States
Ezhou information war exercise, China Military Doctrine
investment in Symantec, Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec
military doctrine for cyber war, China Military Doctrine, The 36 Stratagems, Anti-Access Strategies, The 36 Stratagems
36 stratagems, The 36 Stratagems
anti-access strategies, Anti-Access Strategies
policy towards nonstate hackers, Are Nonstate Hackers a Protected Asset?
social networking sites, China
superiority of math and science students, China Military Doctrine
Chronicles of Information Warfare, Chronicles of Information Warfare
client-side exploits, Why client-side 0day vulnerabilities can be so devastating
CNAs, China Military Doctrine (see computer network attacks)
CNE, China Military Doctrine (see computer network exploitation)
Cold Zero, Cold Zero (aka Cold Z3ro or Roma Burner)
complexity theory, Conducting Operations in the Cyber-Space-Time Continuum
Comprehensive National Cybersecurity Initiative, Foreword
computer network attacks (CNAs), China Military Doctrine
computer network exploitation (CNE), China Military Doctrine
computer viruses and RBN, Organized Crime in Cyberspace
Conficker worm, The Conficker Worm: The Cyber Equivalent of an Extinction Event?
critical infrastructure, vulnerability to attack, Critical Infrastructure
cross-site