Inside Cyber Warfare - Jeffrey Carr [180]
organized crime, Organized Crime in Cyberspace, Russian Organized Crime and the Kremlin, Organized Crime in Cyberspace, Russian Organized Crime and the Kremlin
Russia, links with government, Organized Crime in Cyberspace, Russian Organized Crime and the Kremlin
Ortega, Alfredo, BIOS-Based Rootkit Attack
OSINT (open source intelligence), How This Book Came to Be
Ovchinsky, Major-General Vladimir, The Facebook Revolution
P
Pakistan, cyber warfare capability, Pakistan
Palantir Technologies, How This Book Came to Be
passive defenses, Responding to International Cyber Attacks as Acts of War
Pauli, Wolfgang, Conducting Operations in the Cyber-Space-Time Continuum
Pavlovsky, Gleb Olegovich, The Foundation for Effective Politics’ War on the Net (Day One), The Foundation for Effective Politics (FEP), Social Networks: The Geopolitical Strategy of Russian Investment in Social Media
peering, What Is an Autonomous System Network?
physical separation of data, Physical separation between data of varying sensitivity
Poland, cyber warfare capability, Poland
Politkovskaya murder, Russian Organized Crime and the Kremlin
Presidential Decision Directive/National Science and Technology Council-8, Active Defense for Cyber: A Legal Framework for Covert Countermeasures
presumptive legitimacy, Cyber Attacks as Armed Attacks
Project Grey Goose, How This Book Came to Be, The Intelligence Component to Cyber Warfare
intelligence collection, The Intelligence Component to Cyber Warfare (see intelligence collection)
proportionality, Jus in Bello Issues Related to the Use of Active Defenses
proportionate countermeasures, An Alternate Basis for Using Active Defenses: Reprisals
Pyongyang Informatics Center (PIC), The DPRK’s Capabilities in Cyberspace
Q
quantum indeterminacy, Conducting Operations in the Cyber-Space-Time Continuum
R
remote access tool (RAT), Social Engineering
reprisals, An Alternate Basis for Using Active Defenses: Reprisals
Republic of Korea, cyber warfare capability, Republic of Korea
Revolution in Miliitary Affairs (Russia), The Russian Federation
“RF Military Policy in International Information Security”, “RF Military Policy in International Information Security”
Roskomnadzor, Roskomnadzor
rules of engagement in cyber war (United States), US Military Doctrine
Russia, The Second Russian-Chechen War (1997–2001), Tatarstan, Russia, SORM-2, The Kremlin and the Russian Internet, Nashi, The Kremlin Spy for Hire Program, Sergei Markov, Estonia, and Nashi, A Three-Tier Model of Command and Control, A Three-Tier Model of Command and Control, Organized Crime in Cyberspace, Russian Organized Crime and the Kremlin, The Russian Federation, The Art of Misdirection, The Foundation for Effective Politics (FEP), Analysis, “Wars of the Future Will Be Information Wars”, “RF Military Policy in International Information Security”, Creating a legend for a cyber attack, The Art of Misdirection, Social Networks: The Geopolitical Strategy of Russian Investment in Social Media, The Facebook Revolution, DST and the Kremlin, The Facebook Revolution, Russia: The Information Security State, Russian Government Policy, New Laws and Amendments, New Laws and Amendments, Government Structures, Government Structures, Russian Ministry of Defense, Electronic Warfare Troops, Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO), Russian Federation Ministry of Communications and Mass Communications (Minsvyaz), The cyber vigilantes, Roskomnadzor
cyber policies, Russia: The Information Security State, Russian Government Policy, New Laws and Amendments, New Laws and Amendments, Government Structures, Government Structures, Russian Ministry of Defense, Internal Security Services: Federal Security Service (FSB), Ministry of Interior (MVD), and Federal Security Organization (FSO), Russian Federation Ministry of Communications and Mass Communications (Minsvyaz), The cyber vigilantes, Roskomnadzor
evolution of policies, Russian Government Policy
government structures,