Inside Cyber Warfare - Jeffrey Carr [173]
Kyrgyzstan (2009), Kyrgyzstan
Myanmar, Myanmar
Russia-Georgia War (2008), The StopGeorgia.ru Project Forum
Zimbabwe, Zimbabwe
Defense Criminal Investigative Services (United States), US Strategic Command (USSTRATCOM)
Defense Intelligence Agency (United States), Office of the Secretary of Defense
Defense Security Service (United States), Office of the Secretary of Defense
Defense Technology Security Administration (United States), Office of the Secretary of Defense
Definition of Aggression resolution, 1974, Cyber Attacks as Armed Attacks
Democratic People’s Republic of Korea, cyber warfare capability, Democratic People’s Republic of Korea
Department of Defense Criminal Investigative Services (United States), US Strategic Command (USSTRATCOM)
Department of Defense Directive 3100.10, Active Defense for Cyber: A Legal Framework for Covert Countermeasures
Dhanjani, Nitesh, An Adversary’s Look at LinkedIn
Dietrich, Sven, Command, control, and exfiltration of data
Digital Sky Technologies (DST), 2005: A Turning Point, DST and the Kremlin, DST and the Kremlin, The Facebook Revolution
DST-Global 2, The Facebook Revolution
Facebook, investments in, DST and the Kremlin
Russian government connections, DST and the Kremlin
directness of attacks, Cyber Attacks as Armed Attacks
Dittrich, Dave, Command, control, and exfiltration of data
DNS, Using Open Source Internet Data (see domain name system)
DNS Team, DNS Team
DOD Cyber Crime Center (United States), US Strategic Command (USSTRATCOM)
domain name system (DNS), Using Open Source Internet Data
Drogin, Bob, The Russian Federation
Drokova, Mariya, Nashi
DST, 2005: A Turning Point (see Digital Sky Technologies)
DZ Team, DZ Team
E
E-BGP (External Border Gateway Protocol), Using Open Source Internet Data
effects-based model of armed attacks, Cyber Attacks as Armed Attacks
Ehudbarak.org.il, Impact
Elkus, Adam, Cyber mobilization
email spam, use in DDoS attacks, One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack
emerging threats, A New Threat Landscape, StopGeorgia.ru Malware Discussions, Twitter as DDoS Command Post against Iran, Social Engineering, Channel Consolidation, An Adversary’s Look at LinkedIn, BIOS-Based Rootkit Attack, Malware for Hire, Anti-Virus Software Cannot Protect You, Targeted Attacks Against Military Brass and Government Executives, Research is the key to offensive capabilities, Delivery of targeted attacks, Command, control, and exfiltration of data, Why client-side 0day vulnerabilities can be so devastating
anti-virus software vulnerabilities, Anti-Virus Software Cannot Protect You
BIOS-based rootkit attacks, BIOS-Based Rootkit Attack
channel consolodation, Channel Consolidation
LinkedIn analysis, An Adversary’s Look at LinkedIn
malware for hire, Malware for Hire
social engineering, Social Engineering
SQL injection, StopGeorgia.ru Malware Discussions
targeted attacks, Targeted Attacks Against Military Brass and Government Executives, Research is the key to offensive capabilities, Delivery of targeted attacks, Command, control, and exfiltration of data, Why client-side 0day vulnerabilities can be so devastating
client-side exploits, Why client-side 0day vulnerabilities can be so devastating
covert malware, Command, control, and exfiltration of data
delivery of attack, Delivery of targeted attacks
researching of targets, Research is the key to offensive capabilities
Twitter and DDoS attacks in Iran, Twitter as DDoS Command Post against Iran
ESTDomains, ESTDomains
Estonia, cyber warfare capability, Estonia
Estonian cyber attacks (2007), The Estonian cyber attacks (2007)
European Commission report on cyber threats, Future Threats
European Convention on Cybercrime, Support from International Conventions
European Union, cyber warfare capability, European Union
evolution of cyber attacks, Cyber Crime
External Border Gateway Protocol (E-BGP), Using Open Source Internet Data
F
Facebook, One Year After the RU-GE War, Social Networking Sites Fall to DDoS