Inside Cyber Warfare - Jeffrey Carr [174]
2009 DDoS attack against, One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack
Russian investments in, DST and the Kremlin, The Facebook Revolution
false identities, False Identities
Farris, Kate, China Military Doctrine
Federal Security Service Law (Russia), New Laws and Amendments
Federal Service for Technical and Export Control, The Federal Service for Technical and Export Control (FSTEC)—Military Unit (Vch) 96010
Fedorov, A.V., “RF Military Policy in International Information Security”
FEP, The Foundation for Effective Politics (FEP) (see Foundation for Effective Politics)
Ferguson, Paul, Atrivo/Intercage
financial fraud statistics, Cyber Crime
Finkelstein, David, Anti-Access Strategies
FISMA (Federal Information Security Management Act), Cyber: The Chaotic Domain
Force 10 Networks, Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec
Foundation for Effective Politics (FEP), The Foundation for Effective Politics’ War on the Net (Day One), The Foundation for Effective Politics (FEP), Analysis
“Russia versus Georgia:War on the Net”, The Foundation for Effective Politics’ War on the Net (Day One)
France, cyber warfare capability, France
Fritz, Jason, Critical Infrastructure
future threats in cyberspace, Future Threats
G
Gaza Hacker Team, Gaza Hacker Team
Germany, cyber warfare capability, Germany
ghOst RAT, Social Engineering
GhostNet, Social Engineering, Case study: GhostNet cyber espionage
Goloskokov, Konstantin, The Estonian cyber attacks (2007)
Gorshenin, Vadim, The Foundation for Effective Politics (FEP)
H
Hacker Croll, TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences
hacker “7”, Organized Crime in Cyberspace
Hackers Pal, Hackers Pal
Harper, Jim, Increasing Awareness
Heartland Payment Systems data breach (2009), Cyber Crime
Hoofnagle, Chris, Cyber Crime
Huawei Symantec Technologies Co. Ltd., Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec, Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec
sale of storage cluster to SimCenter, Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec
Hull, Ralph, The Art of Misdirection
I
I-BGP (Internal Border Gateway Protocol), Using Open Source Internet Data
ID grabber–I, Owning social network users for a small budget of $300–$1,300
IDC, False Identities
identity theft, Foreword
immediacy of attacks, Cyber Attacks as Armed Attacks
imminency of attacks, A Subset of Self-Defense: Anticipatory Self-Defense
India, cyber warfare capability, India
Ingushetia.org (formerly Ingushetia.ru), Assessing the Problem, Ingushetia Conflict, August 2009
Institute for Security Technology Studies, The Russian Federation
instrument-based model of armed attacks, Cyber Attacks as Armed Attacks
IntelFusion.net, How This Book Came to Be
intellectual property theft, Foreword
intelligence collection, The Intelligence Component to Cyber Warfare, The Intelligence Component to Cyber Warfare, The Korean DDoS Attacks (July 2009), One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack, Ingushetia Conflict, August 2009, The Predictive Role of Intelligence, The Predictive Role of Intelligence, Follow the Money, False Identities, SORM-2, Investigating Attribution
attribution, Investigating Attribution (see attribution of cyber attacks)
DDoS attacks on social networking sites (August 2009), One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack
espionage and surveillance, The Predictive Role of Intelligence
false identities, uncovering, False Identities
Ingushetia conflict (August 2009), Ingushetia Conflict, August 2009
Korean DDoS attacks (July 2009), The Korean DDoS Attacks (July 2009)
money trails, Follow the Money
predictive role, The Predictive Role of Intelligence
Project Grey Goose, The Intelligence Component to Cyber Warfare
SORM-2, SORM-2
Intercage, Atrivo/Intercage
Internal