Inside Cyber Warfare - Jeffrey Carr [182]
Silver Star Laboratories (SSL), The DPRK’s Capabilities in Cyberspace
SimCenter, Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec
Singapore, cyber warfare capability, Singapore
Sklerov, Lieutenant Commander Matthew J., Responding to International Cyber Attacks as Acts of War, The United States Should Use Active Defenses to Defend Its Critical Information Systems
Slipchenko, Major General (Ret.) Vladimir, Electronic Warfare Troops
social engineering, TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences, Social Engineering
Chinese GhostNet RAT, Social Engineering
TwitterGate example, TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences
Social Graph API, The Social Graph API
social networking sites, One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack, Nonstate Hackers and the Social Web, Bringing down a social network from the inside, Russia, China, The Middle East, Pakistani Hackers and Facebook, The Dark Side of Social Networks, The Cognitive Shield, TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences, Automating the Process, Catching More Spies with Robots, The automation and virtualization of social network entities, Owning social network users for a small budget of $300–$1,300, Bringing down a social network from the inside, False Identities, DST and the Kremlin, The Facebook Revolution, The Facebook Revolution
2009 DDoS attacks on, One Year After the RU-GE War, Social Networking Sites Fall to DDoS Attack
as vehicles for espionage, The Dark Side of Social Networks
automation of intelligence gathering, Automating the Process, Catching More Spies with Robots, The automation and virtualization of social network entities, Owning social network users for a small budget of $300–$1,300
exploitation with fake entities, The automation and virtualization of social network entities
exploits for sale, Owning social network users for a small budget of $300–$1,300
robots, Catching More Spies with Robots
China, China
denial of service vulnerabilities, Bringing down a social network from the inside
forensic investigation and, False Identities
impact on Arab Spring, color, and flower revolutions, The Facebook Revolution
Middle East, The Middle East
Pakistani hackers of Facebook, Pakistani Hackers and Facebook
proposed Russian laws governing, The Facebook Revolution
Russia, Russia
Russian investment in, DST and the Kremlin
TwitterGate (May 2009), TwitterGate: A Real-World Example of a Social Engineering Attack with Dire Consequences
US Air Force risk assessment, The Cognitive Shield
Social Web, Nonstate Hackers and the Social Web
Sokolov, Sergei, Russian Organized Crime and the Kremlin
SORM-2, SORM-2
South Africa, cyber warfare capability, South Africa
South Korea, cyber warfare capability, Republic of Korea
SQL injection, StopGeorgia.ru Malware Discussions, SQL injection, blind SQL injection, and using BENCHMARK
risks posed by, StopGeorgia.ru Malware Discussions
STNs (security trust networks), Whole-of-Nation Cyber Security
StopGeorgia.ru Project Forum, The StopGeorgia.ru Project Forum, Counter-Surveillance Measures in Place, StopGeorgia.ru Malware Discussions
Forum counter-surveillance measures, Counter-Surveillance Measures in Place
malware discussions, StopGeorgia.ru Malware Discussions
strict liability model of armed attacks, Cyber Attacks as Armed Attacks
Surkov, Vladislav, Nashi, Chronicles of Information Warfare, Social Networks: The Geopolitical Strategy of Russian Investment in Social Media
Sweden, cyber warfare capability, Sweden
Symantec’s partnership with Huawei, Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec
synchronicity, Conducting Operations in the Cyber-Space-Time Continuum
SYNNEX, Globalization: How Huawei Bypassed US Monitoring by Partnering with Symantec
T
Taiwan, cyber warfare capability, Taiwan (Republic of China)
TCP-Syn attacks,