Inside Cyber Warfare - Jeffrey Carr [179]
Minsvyaz, Russian Federation Ministry of Communications and Mass Communications (Minsvyaz), The cyber vigilantes
misdirection, The Art of Misdirection
Mitina, Darya, Nashi
MLAT (Mutual Legal Assistance Treaties), MLAT
MOICE (Microsoft Office Isolated Conversion Environment), Using technologies such as MOICE and virtualization
money trails, Follow the Money
Moonlight Maze, The Russian Federation
Moran, Ned, A Cyber Early Warning Model
Mulvenon, James, Anti-Access Strategies
Myanmar, cyber warfare capability, Myanmar
N
Nashi, The Foundation for Effective Politics’ War on the Net (Day One), One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack, Nashi
possible involvement in attacks on Cyxymu, One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack
National Guard (United States), US Strategic Command (USSTRATCOM)
National Security Agency (United States), Office of the Secretary of Defense
NATO Cooperative Cyber Defense Centre of Excellence (CCDCOE), The Legal Status of Cyber Warfare
NATO, cyber warfare capability, NATO
Naval Criminal Investigative Service (United States), US Strategic Command (USSTRATCOM)
Naval Information Operations Command (United States), US Strategic Command (USSTRATCOM)
Naval Network Warfare Command (United States), US Strategic Command (USSTRATCOM)
Navy Cyber Defense Operations Command (United States), US Strategic Command (USSTRATCOM)
necessity, Jus in Bello Issues Related to the Use of Active Defenses
NetBridge, Social Networks: The Geopolitical Strategy of Russian Investment in Social Media
Network Operations Security Centers (United States), Summary
Nicolescu, Basarab, Conducting Operations in the Cyber-Space-Time Continuum
Nigerian government cyber policies, Control the Voice of the Opposition by Controlling the Content in Cyberspace: Nigeria
Nimr al-Iraq, Nimr al-Iraq (“The Tiger of Iraq”) and XX_Hacker_XX
nonstate actors, Nonstate Actors and the Law of War
nonstate hackers status in host countries, Are Nonstate Hackers a Protected Asset?
North Korea, North Korea, South Korea, The DPRK’s Capabilities in Cyberspace, Democratic People’s Republic of Korea
cyber warfare incidents, North Korea, South Korea
international law and, South Korea
cyberspace capabilities, The DPRK’s Capabilities in Cyberspace, Democratic People’s Republic of Korea
nuclear nonproliferation treaties, Nuclear Nonproliferation Treaties
nuclear plants, cyber attacks on, Critical Infrastructure, Critical Infrastructure
Nugache malware, Command, control, and exfiltration of data
O
Office of the Assistant Secretary of Defense for Global Strategic Affairs (United States), Office of the Secretary of Defense
Office of the Under Secretary of Defense for Acquisition, Technology, and Logistics (United States), Office of the Secretary of Defense
Office of the Under Secretary of Defense for Intelligence (United States), Office of the Secretary of Defense
Office of the Under Secretary of Defense for Policy (United States), Office of the Secretary of Defense
“On Personal Data”, Russian Federal Law 152-FZ, New Laws and Amendments
open source information retrieval libraries, Automating the Process
open source intelligence (OSINT), How This Book Came to Be
Operation Cast Lead, Israel, The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead, Impact, Overview of Perpetrators, Motivations, Hackers’ Profiles, Methods of Attack, Israeli Retaliation
cyber incidents arising from, The Gaza Cyber War between Israeli and Arabic Hackers during Operation Cast Lead, Impact, Overview of Perpetrators, Motivations, Hackers’ Profiles, Methods of Attack, Israeli Retaliation
attack methods, Methods of Attack
hackers’ profiles, Hackers’ Profiles
impact, Impact
Israeli retaliation, Israeli Retaliation
motivations, Motivations
perpetrators, Overview of Perpetrators
Operation DarkMarket, Cyber