About the Author

Newton Lee is CEO of Newton Lee Laboratories LLC, president of the Institute for Education, Research, and Scholarships, and founding editor-in-chief of ACM Computers in Entertainment. Previously, he was a research scientist at Bell Laboratories, senior producer and engineer at The Walt Disney Company, and research staff member at the Institute for Defense Analyses where he co- pioneered artificial intelligence applications in counterterrorism. Lee gradu- ated Summa Cum Laude from Virginia Tech with a B.S. and M.S. degree in Computer Science, and he earned a perfect GPA from Vincennes University with an A.S. degree in Electrical Engineering and an honorary doctorate in Computer Science. He is the co-author of Disney Stories: Getting to Digital and the author of the Total Information Awareness book series including Facebook Nation and Counterterrorism and Cybersecurity.

N. Lee, Counterterrorism and Cybersecurity, DOI: 10.1007/978-1-4614-7205-6, 213 © Springer Science+Business Media New York 2013 Index

1 A 100 Day Plan for Integration and Abbottabad, Pakistan, 11, 109, 161 Collaboration, 25 ABC, 157, 181 198 methods of nonviolent action, 185, 190 Abduction, 68 1983 Beirut barracks bombing, 167 Abortion clinics, 165 1984, 43 Achieve Cybersecurity Together, 122, 123 1984 National Security Decision Directive ACLU. See American Civil Liberties 138, 37 Union, 52 1985 Beirut car bombing, 167 ACM. See Association of Computing 1996 Summer Olympics, 162 Machinery, 42 Acquired immune deficiency syndrome, 77 2 ACT. See Achieve Cybersecurity 2001: A Space Odyssey, 64 Together, 122 2003 Northeast blackout, 103 Ad Age, 85 2008 presidential campaign, 106 Ada, 107 2009 Supplemental-War Funding Bill, 58 Ada Mandate, 107 2010 Flash Crash, 102 Ada Programming Support 2010 Times Square car bombing attempt, 89 Environment, 4, 107 2011 State of the Union Address, 84 ADAMS. See Anomaly Detection at Multiple 2012 Aspen Security Forum, 102 Scales, 56 2012 Black Hat Conference, 89, 124 Address Space Layout Randomization, 130 2012 presidential election, 84 Adichie, Chimamanda Ngozi, 179 2012 RSA Conference, 100 Adobe, 124 2013 State of the Union Address, 208 Adobe Acrobat, 130 24 (TV series), 8, 19, 176, 178 Adobe Flash, 131 Adobe Reader, 130 ADS-B. See Automatic Dependent 5 Surveillance—Broadcast system, 151 500 Day Plan for Integration and Advanced persistent threat, 100 Collaboration, 25 Advanced Research Projects Agency, 38 Advanced Research Projects Agency Network, 38 9 AeroVironment, 86 9/11 attacks, 3 Aesop, 22, 174, 178 9/11 Commission, 20 AF ISR. See Air Force Intelligence, 9/11 Commission Report, 160 Surveillance, and Reconnaissance, 25

N. Lee, Counterterrorism and Cybersecurity, DOI: 10.1007/978-1-4614-7205-6, 215 © Springer Science+Business Media New York 2013 216 Index

AFDI. See American Freedom Defense American University, 206 Initiative, 184 Aminah, 93, 166 Afghanistan, 9, 19, 30, 66, 107, 160, 161, Amsterdam, 202 163, 164, 174, 184, 198, 200, 208 Analytic space, 93 Afghan peace volunteers, 179, 198 Analytical models, 68, 69, 71, 72 AFP. See Australian Federal Police, 125 Anarchist terrorism, 162 Aftergood, Steven, 182 Anderson Cooper 360°, 29 agent.btz, 107 Android, 87, 147, 151 Ahmad, 58 Andrus, Calvin, 92 AI. See Artificial intelligence, 63 Angry Birds Space, 131, 133 AIDS. See Acquired immune deficiency Angry Birds Star Wars, 133 syndrome, 77 Anomaly Detection at Multiple Scales, 56 Air Force Intelligence, Surveillance, and , 110, 147, 151 Reconnaissance, 25 Anti-colonial terrorism, 163 Air Force Research Laboratory, 158 Anti- definitions, 132 Air traffic control, 151 Anti-Phishing Working Group, 128 Aitel, Dave, 135 AOL, 87 Al-Aqsa Mosque, 165 Apollo 11, 208 al-Ashja’i, Rakan, 180 Apple, 126, 128, 130 al-Assad, Bashar, 110 Apple App Store, 131 al-Awlaki, Anwar, 93, 159, 161, 161, AppleID, 126 166, 184 APSE. See Ada Programming Support al-Bahri, Nasser, 19, 178 Environment, 4 Albert Einstein Institution, The, 185 APT. See Advanced persistent threat, 100 Albright, Madeleine, 167 APWG. See Anti-Phishing Working Aldrin, Buzz, 208 Group, 128 Alexander, Keith, 102, 133, 147, 150, 151 AQAP. See al-Qaeda in the Arabian Algeria, 162 Peninsula, 166 al-Hazmi, Nawaf, 17, 21 AQIM. See al Qaeda in the Islamic Alijazeera, 163 Maghreb, 162 al-Jaabari, Ahmed, 199 Aquino, Benigno, 206 Al Jazeera, 17 AR. See augmented reality, 146 Allen, Ernie, 57 Arab spring, 92, 162, 191 al-Libi, Abu Yahya, 11, 176 Arabian Peninsula, 162 al-Mihdhar, Khalid, 17, 21, 43 Arabic language, 19, 45 al-Najadi, Abu Mus’ab, 163 Arab-Israeli conflict, 204 Alperovitch, Dmitri, 110 Arafat, Yasser, 46 al-Qaeda, 11, 27, 43, 90, 100, 158, Aramco, 110 160- 162, 164, 174 Argentina, 55, 179 al-Qaeda in the Arabian Peninsula, 166 Argo, 111 al-Qaeda in the Islamic Maghreb, 162 Argus, 55 al-Qaradawi, Yusuf, 166 Armstrong, Neil, 208 al-Quso, Fahd, 18 Army Intelligence, 25 al-Sharia, Ansar, 11, 176 ARPA. See Advanced Research Projects alternative energy, 38 Agency, 38 al-Wuhayshi, Basir, 166 ARPANET. See Advanced Research Projects al-Zawahiri, Ayman, 162 Agency Network, 38 Alzheimer’s disease, 77 Artificial cardiac pacemaker, 112 Amazon.com, 100, 126, 128 Artificial intelligence (AI), 4, 58, 63, 66- 68 America at war, 9 Asia, 88 American Civil Liberties Union, 52, 151 Asimov, Isaac, 63 American Freedom Defense Initiative, 184 ASLR. See Address Space Layout American revolution, 178 Randomization, 130 America’s Most Wanted, 76 A-Space, 93 Index 217

Aspen Institute Security Conference, 26 Bauer, Jack, 19, 176, 178 Aspen security forum, 72, 174 Behavioral causality, 70 Assange, Julian, 86, 90, 93, 182, 182 Beirut, 167 Assassination, 167 Belasco, Amy, 44 Association for Computing Bell Laboratories, 4, 110 Machinery, 42, 66 BellSouth, 53 AT & T, 52, 53, 100 Benghazi, 30 Atkins, Christopher R., 91, 180 Benghazi, Libya, 11, 29, 161, 176 Atlanta, 86, 162 Ben-Itzhak, Yuval, 147 Atta, Mohammed, 19 Bergen, Peter, 28, 159 Audi, 151 Berry, Halle, 8 Augmented reality, 146 Betty Boop, 130 AUMF. See Authorization for the Use of BGP. See Border Gateway Protocol, 144 Military Force, 167 Bidirectional authentication, 129 Auriemma, Luigi, 127 Big Brother, 43, 84, 89 Aurora, Colorado, 164 Big data, 84 Aurora theater shooting, 8 Big Data Research and Development Australia, 55 Initiative, 56, 66 Australian Federal Police, 125 Bill and Melinda Gates Foundation, 173 Authorization for the Use of Military Bill of Rights, 52 Force, 167 Bin Abdulaziz, Sultan, 17, 175 Automated Speech and Text Exploitation in Bin Laden of the internet, 93, 161, 184 Multiple Languages, 48, 56 Bin Laden, Osama, 8, 9, 15, 25, 90, 160, Automatic Dependent Surveillance— 161, 163, 164, 175, 176, 178, 192 Broadcast system, 151 Bin Laden raid, 90, 109 AVG , 147 Bin Laden, Usama. See bin Laden, Osama, 16 Avner, Carmela, 111 Binney, William, 52 Azerbauan, 104 Bin Rashid Al Maktoum, Mohammed, 179 Bio-Event Advanced Leading Indicator Recognition Technology, 48, 56 B Biometrics, 45 Babbage, Charles, 107 Biometric security systems, 151 Babylon, 48, 56 Bio-surveillance, 41, 55 Babylonian Empire, 175 BlackBerry, 87 Bacile, Sam, 183 Black, Cofer, 20 Backdoor (software), 109 Black Hat, 89 Backward chaining, 68 Blackhawk Helicopter, 109 Bacon, Sir Francis, 176 Blackholing, 123 Baghdad, 175 Black Knight Troop, 208 Ballistic Missile Defense System, 108 Blanton, Thomas, 90, 173, 182 Bamford, James, 59 Bloom, Allan, 203 Bandwidth over-provisioning, 123 Bloomberg, Michael, 184 Bangkok, 21 Blue army, 111 Ban, Ki-moon, 199 Bluffdale, Utah, 58, 65 Bank of America, 110, 122 BMDS. See Ballistic Missile Defense Bank of Jerusalem, 111 System, 108 Baraich, Fazal Mohammad, 161 BMT Syntek technologies, 38 Barkun, Michael, 165 Bombay, India, 177 Barnes and Noble, 125 Bond, James, 134 Barr, Tara Lynne, 8 Border Gateway Protocol, 144 Barsamian, David, 167 Bordoloi, Chiranjeev, 113 Base transceiver station, 135 Boscovich, Richard Domingues, 132 Battle for public opinion, 111 Boston, 183 Battle of Fredericksburg, 199 Bostrom, Nick, 64 218 Index

Botnet, 100, 110, 122, 123, 133 CCTV. See closed-circuit television, 83 Boyd, Daniel Patrick, 28 CDC. See Centers for Disease Control and Branch Davidian, 191 Prevention, 173 Brandenburg, Clarence, 183 Cell phone, 112 Brandenburg v. Ohio, 183 Cell tower, 135 Brazil, 128, 179 Centennial Olympic Park bombing, 162, Breivik, Anders Behring, 166 165, 192 Brennan, John, 159 Center for Democracy and Technology, 91 Bridle, James, 159 Center for Strategic and International Studies, British telecommunications, 101 112, 150 Brody, Nicholas, 160 Centers for Disease Control and Prevention, Brookings Institution, 161 173 Brown, David, 65 Central intelligence agency, 17, 21, 26, 56, BTS. See Base transceiver station, 135 66, 92, 147, 159, 164 Buffer overflow, 105 Central intelligence agency counterterrorism Bug bounty, 136 center, 19, 174 Bulwer–Lytton, Edward, 183 Central security service, 25, 53, 102, 133 Bureau of Intelligence and Research, 25 Centralized database, 67 Burke, Don, 92 Cerf, Vinton, 92 Burrows, Mathew, 113, 162 CFG. See control flow graph, 145 Bush, George H. W., 136, 175 CFR. See Council on Foreign Relations, 166 Bush, George W., 3, 8, 11, 12, 51, 53, 105, Change detection, 45 120, 136, 157, 158, 181, 182 Charles Schwab, 100 Bush, Jeb, 182 Chávez, Hugo, 179 Bush, Laura, 202 Chechen, 162 Buy.com, 101 Cheney, Dick, 8 CAE. See National Centers of Academic Chertoff, Michael, 8 Excellence, 146 Chicago, 65, 84, 86, 162 CAE-Cyber Operations, 146 Child soldiers, 164 Cage-fighting, 176 Chile, 55 CAIR. See Council on American-Islamic China, 55, 109, 111, 150, 165, 205, 206 Relations, 176 China Institute of Contemporary International Cairo, 199 Relations, 150 California, 125 Chinese, 45 California Institute of Technology, 37 Chinese Foreign Ministry, 111 Call of Duty:Modern Warfare 3, 127 Chinese Wall, 20, 27 Caller ID spoofing, 127 Chomsky, Noam, 167, 197, 203 CALO. See Cognitive Assistant that Learns Choudhry, Anjem, 161 and Organizes, 64 Choudhry, Roshonara, 184 Caltech. See California Institute of Christianity, 163 Technology, 37 Christian terrorists, 165 Cameron, David, 179 Chrome, 136 Camp Williams, 58, 65 CI. See Counterintelligence, 120 Canada, 88, 89 CIA. See Central Intelligence Agency, 17 Cancer, 77 CICIR. See China Institute of Contemporary Capital One 360, 129 International Relations, 150 CAPPS. See Computer-Assisted Passenger Cisco, 100, 109 Prescreening System, 21 Citibank, 101 Carnegie Mellon University, 103 Citigroup, 125 Carper, Tom, 119 Citizen detectives, 76 Carrier IQ, 87 Citizen scientists, 77 Carter Center, 173 Civil disobedience, 191 Carter, Jimmy, 54 Civilian drone, 88 Cashmore, Pete, 89 Civil liberties, 151 Index 219

Civil rights movement, 88 COTS. See commercial off-the-shelf, 107 Clarke, Arthur C., 64 Council on American-Islamic Relations, 176 Clarke, Richard, 101, 109 Council on Foreign Relations, 166 Cleveland, 183 Counterfeit electronic parts, 108 Clinton, Bill, 15, 101, 161, 173, 174, 191 Counterintelligence, 120 Clinton, Hillary, 3, 12, 47, 162, 184, 199 Counterterrorism, 4, 67 Closed-circuit television, 64, 83 Counterterrorist center, 15 Closing of the American Mind, The, 203 Coviello, Art, 100 Cloud-based DDoS mitigation service, 123 Creech Air Force Base, 107 Cloud computing, 76, 127 Crumpton, Henry “Hank”, 72, 173, 174 CnC. See command-and-control server, 110 Crusades, 176 CNCI. See Comprehensive National CryEngine 3, 127 Cybersecurity Initiative, 120 Cryptographic keys, 128 CNN, 101 CSIS. See Center for Strategic and CNO. See Computer Network Operations, 53 International Studies, 112 Coast Guard Intelligence, 25 CSS. See Central Security Service, 25 Coburn, Tom, 28 CTC. See Counterterrorist Center, 15 Code of Hammurabi, 175 Cuba, 11 Code Red, 101 Cunningham, Bryan, 57 Cognitive Assistant that Learns and Organizes, Cyber awareness challenge, 121 64 Cyber battlespace, 144 Cognitive augmentation, 65 Cyber battlespace graphing engine, 144 Cognitive science, 67 Cyber Cold War, 111 Cohen, Stephen, 56 Cyber espionage, 108, 136, 143 Cold War, 167 Cyber operations, 143 Collaborative reasoning, 44 Cyber Security and American Cyber Collateral damage, 145, 159, 167, 168 Competitiveness Act of 2011, 119 Collin, Barry, 112 Cyber security knowledge transfer network, 76 Collins, Michael, 208 Cyber Storm, 122 Collins, Susan, 119 Cyber terrorism, 112 Collision resistance, 125 Cyber war, 111, 143 Colombia, 179 Cyber warrior, 204 Columbine High School, 164 Cyber warfare, 100, 109, 112, 113, 204 Command-and-control server, 110 Cyber weapons, 105, 143, 146 Command-and-control, 123 Cybercriminals, 120, 124 Commercial off-the-shelf, 107 Cyber-industrial complex, 120 Committee on Oversight and Government Cybersecurity Act of 2009, 119 Reform, 30 Cybersecurity Act of 2012, 119 Commwarrior.A, 133 Cyber-Security Enhancement Act of 2007, 119 Component clustering, 71 Cyberspace, 99, 112 Component decoupling, 71 Cyberwarfare, 144 Comprehensive national cybersecurity initia- CyFi, 147, 149 tive, 120 Computational inference, 76 Computer network exploitation, 112 D Computer-assisted passenger prescreening Dakota State University, 146 system, 21 Dark Knight Rises, The, 8 Conflicker, 101 DARPA. See Defense Advanced Research Connecticut, 125 Projects Agency, 4 Contos, Brian, 151 DAS. See Domain Awareness System, 57 Control flow graph, 145 Daschle, Tom, 47 Cookies, 87 Data breach, 124 Coreflood, 124 Data execution prevention, 130 Costolo, Dick, 150 Data loss prevention, 126 220 Index

Data mining, 56, 66, 84 Dirt jumper, 124 Data privacy day, 122 Disinformation, 183 Data security standards, 126 Disney, 83, 84, 147 Data warehouse, 66 Disney california adventure, 5 Database, 66 Disney online, 4, 7 Data-mining virus, 108 Disney voluntEARS, 6 Davis–Besse nuclear power plant, 104 Disney’s animal kingdom, 6 DCI. See Director of Central Intelligence, 15 Disney’s crash course in flying, 6 DDoS. See Distributed denial of service, 122 Disney’s epcot center, 6 de Kirchner, Cristina Fernández, 179 Disney’s hollywood studios, 6 DEA. See Drug Enforcement Administration, Disney’s human wall procedure, 6 25 Disney’s jungle cruise ride, 6 Dear, John, 179, 198, 200 Disney’s magic kingdom, 6 Decay of Lying, The, 8 DisneyHAND, 6 Decision support system, 44 Disneyland, 5, 83, 84, 129 Declaration of independence, 181 Distributed database, 67 Deep throats, 182 Distributed denial of service, 101, 111, 122, Deep web, 93 133 Deep-background briefing, 181 Distributed reflected denial of service, 122 Deepnet, 93 DJIA. See Dow jones industrial average, 102 DEF CON, 89 DKIM. See Domainkeys identified mail, 128 DEF CON 19, 147 DLP. See Data loss prevention, 126 DEF CON 20, 89, 126, 147, 150, 151 DM2 algorithm, 69, 72 Defense advanced research projects agency, 4, DNI. See Director Of national intelligence, 23 38, 56, 64, 86, 133, 136, 143, 158 DNS attacks, 123 Defense intelligence agency, 22, 25 DNS cache poisoning, 127 Defense science board, 93 DNS hijacking, 127 Defibrillator, 112 DNS spoofing, 127, 131 Dell, 111 DNS. See Domain name system, 127 Democracy, 191 DNSChanger, 128 Denial of service, 103, 110, 122 DoD. See Department of defense, 4 Denmark, 89 DOE. See Department of energy, 25 Dennehy, Sean, 92 Doherty, Glen, 11 Deontic logic, 68 Dolci, Danilo, 191 DEP. See Data Execution Prevention, 130 Domain awareness system, 57, 65, 76 Department of defense, 4, 39, 56, 158 Domain name system, 127 Department of defense northern command, 23 Domain specific language, 145 Department of energy, 25, 56, 64 DomainKeys identified mail, 128 Department of homeland security, 23, 25, Domestic terrorism, 162 28, 105 Dorgan, Byron, 47 Department of the treasury, 25 DoS. See denial of service, 122 Der Spiegel, 182 DoubleClick, 87 Detroit, 162 Dow Jones industrial average, 102 DH & ASA. See Homeland defense and DPD. See Data privacy day, 122 Americas’ Security affairs, 102 Dracunculiasis, 173 DHS. See Department of Homeland DRDoS. See distributed reflected denial of security, 25 service, 122 DIA. See Defense intelligence agency, 25 Drone, 76, 135, 158 Diaz, Ann-Christine, 85 Drone attacks, 90, 158, 161, 167, 198, 200 Digital certificate, 104, 131 Dronestagram, 159 Digital natives, 146 Dropbox, 135 Digital pearl harbor, 113, 120 Drug enforcement administration, 25 Director of central intelligence, 15 DScent, 76 Director of national intelligence, 23 DSL. See domain specific language, 145 Index 221

D’Souza, Dinesh, 157 Essayes and counsels, civil and moral, 176 DSS. See Data Security Standards, 126 Etzioni, Amitai, 84 Dubai, 91, 179 Europe, 88, 166, 207 Dugan, Regina, 38, 136, 150 Evans, Jonathan, 176 Duke University, 164 Evers, Medgar, 157, 160 Dun and Bradstreet, 101 Evidence extraction and link discovery, 39, , 109, 110 41 Dutch national high tech crime unit, 125 Evidential reasoning, 45 Dynamic mental models, 68, 72 Excite, 101 Executive decision, 8 Executive office of the president, 4, 22 E Executive order 12333, 167 E*Trade, 101 Experiential knowledge, 68, 71, 72 E2EE. See end-to-end encryption, 126 Experimental design, 68 Easter eggs, 107 Expert systems, 67, 68 eBay, 100, 128, 150 Exxon mobil, 110 Ebola virus, 55 Exynos, 133 Eckhart, Trevor, 87 Eco, Umberto, 168 Economic warfare, 163 F Edinburgh, 162 Facebook, 84, 86, 89, 91, 93, 100, 127- Edry, Ronny, 204 129, 133, 136, 166, 180, 180, 184, Education, 202 204, 205, 205 EELD. See Evidence extraction and link Facebook generation, 146 discovery, 41 Facebook group, 93 Egypt, 91, 162, 167, 175, 184, 199 Facebook IPO, 102, 147 Eisenhower, Dwight, 38 Facebook nation: total information awareness, Eisner, Michael, 3, 6 77, 85 Electromagnetic pulse, 112, 136 Facebook security, 127 Electromagnetic radiation, 112 Facial recognition, 65, 77, 84 Electronic arts, 90 Fadlallah, mohammad hussein, 167 Electronic privacy information center, 40 Fahd, king, 175 Elevation of privilege, 104 Fahrenheit 9/11, 182 Ellsberg, daniel, 181, 182 Fandango, 88 El Pais, 182 Faris, Iyman, 53 Email, 67 Fatwa, 15, 165 Emmett, Laura, 86 FBI Cyber Division, 113 EMP. See electromagnetic pulse, 112 FBI joint terrorism task force, 28 EMP commission, 112 FBI ten most wanted fugitives, 16 Encryption, 126 FBI. See Federal bureau of investigation, 7 End-to-end encryption, 126 FBIS. See Foreign broadcast information Enemy combatant, 167 service, 23 Engelhardt, Tom, 161 FCC. See Federal communications England, 162 commission, 134 English, 45 Federal aviation administration, 21 Engressia, Joe, 132 Federal bureau of investigation, 4, 7, 21, 26, Enhanced Interrogation Approach, 27 30, 100, 124, 124, 162, 197 EoP. See elevation of privilege, 104 Federal bureau of investigation national EPIC. See Electronic Privacy Information security division, 18 Center, 40 Federal communications commission, 134 Equifax, 101 Federal debt ceiling, 164 Eric Rudolph, Eric, 162 Federal reserve system, 107, 125 Espionage Act, 90 Federation of american scientists, 182 Espionage, 93 Feinstein, Dianne, 27 222 Index

Ferdaus, Rezwan, 28 Gard, Robert, 164 Ferrante, Donato, 127 Gauss, 108 Ferrucci, David, 64 Gaza, 110, 200 Filtering, 123 Gaza-Israel conflict, 199, 200 FINPUSH floods, 123 GCS. See Ground control station, 107 Firewalls, 106, 123 Gearhart, John, 177 First amendment, 181, 182, 184 Geithner, Timothy, 164 First data corporation, 126 Geller, Pamela, 184 FISA Amendments act of 2008, 54 Gen Tech, 146 FISA. See Foreign intelligence surveillance General Electric, 150 Act, 54 General Staff, The, 111 , 107, 146 Generation Wii, 146 Flashback, 131 Generation X, 146 Florida, 125, 182 Generation Y, 146 Flynn, Michael T., 66 Generation Z, 146, 149 Fogleman, Dan, 126 Geneva Conventions, 199 Folding@home, 77 Genisys, 42 Foldit, 77 Genisys privacy protection program, 42 Foreign affairs, defense, and trade division, 44 Genoa, 41 Foreign broadcast information service, 23 Genoa, Project, 38 Foreign intelligence surveillance act, 54 Geolocation, 67 Forensic psychology, 76 George Washington University, 84, 90, Fort Meade, Maryland, 58 173, 182 Forward chaining, 68 George, Richard M., 143 Foundational Cyberwarfare, 144 Georgetown University, 55 Four oxen and the lion, The, 22 Gestapo, 52 Fourth amendment, 52, 54 GET floods, 123 Fox, 76 Gettings, Nathan, 56 France, 128, 162 Ghassan, Abu, 197, 204 Frank, Anne, 202 Gibraltar, 162 Freddie Mac, 100 Gilligan John, 107 Free press, 181 Giorgio, Ed, 120 Free speech, 185 Girls who code, 150 Freedom House, 92 Global payments, 125 Friendships on facebook, 203 Global positioning system, 134, 136 Fritz, David, 135 Global system for mobile communications, Functional inversion, 69 135 FUSEDOT. See FUzzy Signal Expert Gmail, 126, 128 system for the detection Of terrorism God bless america, 8 preparations, 75 Golden globe award, 111 Fusion centers, 28 Goldstein, Ken, 7, 201 FutureMAP. See Futures markets applied Goldstone, Richard, 199 to prediction, 46 Gomaa, Ali, 206 Futures Markets Applied to Prediction, 46 Gomez, Alejandro, 5 Futures markets, 54 Goodman, Marc, 102, 150, 157, 162, 173, Futurist, 162 174, 201 Fuzzy logic, 68 Google, 84, 86, 89, 89, 91, 92, 100, 120, Fuzzy signal expert system for the detection 120, 124, 126, 129, 136, 136, 150, of terrorism preparations, 75 159, 184 G-2. See Army intelligence, 25 Google , 90 Gaddafi, Muammar, 12 Google +earth, 87, 159 Galleani, Luigi, 183 Google maps, 87, 89 Game companies, 149 Google play, 131 Gandhi, Mahatma, 185, 207 Google safe browsing team, 129 Index 223

Google street view, 89 Hertzberg, Hendrik, 40 Gorelick, Jamie, 20 Heuristically programmed algorithmic Gorman, Siobhan, 51 computer, 64 Gozi prinimalka trojan, 102 Heuristic question answering, 67 GPS receiver, 134 Hewlett–Packard, 54 GPS satellites, 134 Hezbollah, 167 GPS spoofing, 134 HID. See Human identification at distance, 41 GPS. See Global positioning system, 134 Hierarchical database, 67 Grand mufti, 206 High-energy radio frequency, 112 Graphical user interface, 38 High orbit ion cannon, 124 Great firewall, 111 Hinduism, 163 Great wall of china, 111 Hiroshima, 168, 198 Grimes, Roger, 109 HOIC. See High orbit ion cannon, 124 Ground control station, 107 Holdren, John P., 56 Grum, 124 Hollywood, 8, 27, 63, 111, 151 GSA. See U.S. General services Hollywood stock exchange, 54 administration, 109 Holmes, Oliver Wendell Jr., 174, 183 GSM. See Global System for mobile Holmes, Sherlock, 200 communications, 135 Holocaust, 198 GTE, 101 Home automation, 151 Guantánamo bay, 11 Homeland (TV series), 8, 157, 160 Guardian, The, 182 Homeland defense and americas’ security Guerrilla warfare, 163 affairs, 102 Guinea worm disease, 173 Homeland security act, 40 Guinness world record, 77 Homeland security and governmental affairs Gül, Abdullah, 179 committee, 28 GWD. See Guinea worm disease, 173 Honan, Mat, 126, 135 Hong Kong, 9 House of representatives house armed services H committee, 43 H3N2 influenza virus, 55 House oversight committee. See committee on H5N1 avian influenza, 55 oversight and government reform, 30 , 132, 136, 147 Howard, Beth, 180 Hacking, 125 HSBC, 128 , 110, 125 HSX. See Hollywood stock exchange, 54 Hacktivist, 151 HTTP GET floods, 123 Hadith, 166 HTTP POST floods, 123 HAL. See Heuristically programmed Huis ten bosch palace, 89 algorithmic computer, 64 Human identification at distance, 41 Hamas, 110, 166 Human intelligence, 68 Hammurabi, 175 Human–computer symbiosis, 68 Harris, Shane, 59 Huntington disease, 77 Harris, Zachary, 128 Hurricane Sandy, 159 Harvey Mudd College, 149 Husain, Ed, 166 Haseltine, Eric, 7, 55, 56 Hussein, Saddam, 160, 175, 182 Hash function, 125 HyperCard, 110 Hate speech, 185 Hayden, Michael, 52, 105 Haysbert, Dennis, 8 I Heat map, 144 I Am Malala, 201 Hedges, Chris, 163 I, Robot, 63 Henry, Shawn, 124 I2O. See Information Innovation Office, 56 HERF. See high-energy radio frequency, 112 I-49 squad, 18 Hersh, Seymour, 20 IA. See intelligence amplification, 65 224 Index

IAO. See Information awareness office, 39 Instagram, 159 IASE. See Information assurance support Institute for creative technologies, 8 environment, 121 Institute for defense analyses, 4, 67 IBEX, 102 Intel, 100 IBM, 100, 111 Intellectual property, 151 IBM Deep blue computer, 64 Intelligence amplification, 65 IBM Watson computer, 63 Intelligence and security command, 45 iCloud, 127 Intelligence community, 22, 25 ICMP floods, 123 Intelligence reform and terrorism prevention ICS. See Industrial control systems, 105 act, 23 ICS-CERT. See Industrial control systems Intellipedia, 92 cyber emergency response team, 105 Interagency security classification appeals ICT. See Institute for creative technologies, 8 panel, 90 IDA. See Institute for defense analyses, 4 Interestingness metrics, 66 Identification, friend or foe, 144 Internal medicine, 70 IDF. See Israeli defense force, 110 International humanitarian law, 199 IEM. See Iowa Electronic Markets 54 International mobile subscriber identity, 134 IFF. See identification, friend or foe, 144 International security assistance force, 160 iGeneration, 146 International telecommunication regulations, Iger, Bob, 7 91 IGMP floods, 123 International telecommunication union, 91, Ilacas, Perigil, 5 108 Illinois, 124, 125 International terrorism, 4, 162 ILOVEYOU, 101 Internet, 151 Immigration and naturalization service, 21 Internet clean pipe, 123 Immunity CANVAS, 145 Internet freedom grants, 204 IMSI catcher, 135 Internet hijacking, 111 IMSI. See International mobile subscriber Internet protocol, 122 identity, 134 Internet service provider, 124 Iñárritu, Alejandro González, 85 Interpol terrorism watch list, 21 Inception, 3 INTERPOL, 147 India, 104, 205 Intranet, 150, 151 Indiana University, 57 Invincea, 133 Indonesia, 104, 184, 205 Iowa electronic markets, 54 Industrial control systems, 105 IP. See Internet Protocol, 122 Industrial control systems cyber emergency iPad, 64, 87, 126 response team, 105 iPhone, 64, 87, 126, 147 Industrial terrorists, 101 iPod, 64 Information assurance support environment, IPTO. See Information processing techniques 121 office, 38 Information awareness office, 39, 56 IRA. See Irish republican army, 84 Information innovation office, 56 Iran, 38, 104, 111, 122, 135, 167, 200, Information processing techniques office, 38 204 Information warfare, 112 Iran hostage crisis, 111 Informed interrogation approach, 27 Iran’s nuclear centrifuge program, 90 ING Direct, 129 Iran-contra affair, 37 Inglis, John Chris, 59 Iraq, 11, 162, 163, 165, 182 Innocence of muslims, 183, 206 Irish reporting and information security In-Q-Tel, 57 service, 125 INR. See Bureau of intelligence and research, 25 Irish republican army, 84 INS. See Immigration and naturalization IRISS. See Irish Reporting and information service, 21 security service, 125 INSCOM. See Intelligence and security com- ISAF. See International security assistance mand, 45 force, 160 Index 225

Isikoff, Michael, 19, 43 Kernell, david, 129 Islam, 166 Keylogger, 107, 110 ISP. See Internet service provider, 124 KGB, 52 Israel, 108, 166, 184, 200, 206 Khallad, 18 Israeli defense force, 110 King, Martin Luther Jr., 197, 199, 206, 207 Israel ministry of foreign affairs, 111 KKK. See Ku Klux Klan, 183 Italy, 89 Klawe, Maria, 149 ITRs. See International telecommunication Klein, Mark, 52 regulations, 91 KL-ONE, 67 Itsoknoproblembro, 122 Knight capital, 102 ITU. See International Telecommunication Knowledge acquisition, 67, 75 Union, 108 Knowledge inference, 68 Knowledge representation, 67 Koehler, Robert, 192 J Kovach, Aram, 177 Jailbreaking, 134 Kramer, John F., 4 Jamal, Muhammad, 11 Kramer, Terry, 92 Jandal, Abu, 8, 19, 178 KTN. See Cyber security knowledge transfer Japan, 162 network, 76 Japanese American internment, 54 Ku Klux Klan, 183 Java, 130 Kubrick, Stanley, 64 Jefferson, Thomas, 174, 181 Kuwait, 165, 175 Jeopardy!, 63 Jerusalem, 199, 200 Jihad, 15, 161, 184 L Johns, John, 164 LaFountain, Steven, 146 Johnson, Hank, 88 Language translation, 45 Johnson, Lyndon, 181 Las vegas, 84, 150 Johnson, Tom, 29 Lashkar-e-Taiba, 162 Joint Force Quarterly, 164 Le Monde, 182 Jones, Nigel, 76 Lebanon, 108, 165, 184 Joybubbles, 132 Lecter, Hannibal, 158 JPMorgan Chase, 110, 122 Lee, Newton, 92 JSTOR, 151 Lee, Robert E., 199 Left-wing terrorism, 162 Level of abstraction, 71, 73 K Levin, Carl, 27, 28 Kabul, 179 Levin, Vladimir, 101 Kaczynski, Ted, 166 Lewis, James A., 112 Kahn–Troster, Rachel, 184 Lewis, Jim, 150 Kandahar, Afghanistan, 20 Libya, 176, 183 Kansas, 180 License Plate Readers, 57 Kansas State University, 54 Licklider, J. C. R., 38 Karp, Alex, 56 Lieberman, Donna, 86 Kasparov, Garry, 64 Lieberman, Joe, 28, 119 Kaspersky lab, 104, 108 Lifetime, 76 Kaspersky, Eugene, 109 Lightning, 136 Kean, Tom, 90 Lindquist, Timothy, 4 Keller, Bill, 90, 182 LinkedIn, 125, 128 Kelly, Raymond, 86 Lisp, 67 Kennedy, John F., 136, 197 Little Rock, 88 Kennedy, John F., 5, 201, 206, 206, 208 Llansó, Emma, 91 Kennedy, Ted, 54 Location tracking, 87 Kenya, 15, 175 Lockerbie bombing, 4 226 Index

Logan, Lara, 174, 178 McDuffie, Mike, 58, 76 London, 65 MCI, 101 Long Beach, 38, 136 McRaven, William, 26 Long, Letitia “Tish”, 15, 25, 150 McVeigh, Timothy, 162, 165, 175, 192 Lonsdale, Joe, 56 MDA. See Missile Defense Agency, 108 Lorenz, Stephen, 112 Mecca, 15 Los Angeles, 84 MECCA. See Muslim Educational Cultural Lourdeau, Keith, 113 Center of America, 176 Lovelace, Ada, 107, 147 Medal of Honor, 208 Lower manhattan security coordination center, Medal of Honor: Warfighter, 90 58, 65 Media innovation group, 87 Low-intensity warfare, 168 Medina, 15 LPRs. See License Plate Readers, 57 Medvedev, Dmitry, 179 Lynn, William, 107 Melissa, 101 Mental models, 68, 69 Merriam-Webster Dictionary, 88 M Metadata, 144 Macau, 88 Metasploit, 145 MacBook, 126 Meteorological forecasting, 69 MacDougall, Shane, 126 Metropolitan Transportation Authority, 184 Machine learning, 4, 66, 67 Mexico, 88, 179 Macintosh SE, 110 MI5, 176 Macintosh, 87, 110 Miami, 88 Mac OS, 110 Microsoft, 58, 65, 76, 100, 111, 124, 128, Mafiaboy, 101 131 Maghreb, 11 Microsoft Digital Crimes Unit, 132 Maher, Bill, 157, 168, 181 Microsoft IIS web server, 101 Malaysia, 18 Microsoft Safety Scanner, 132 Mali, North Africa, 162 Microsoft Security Intelligence Report, 131 Malware, 100, 104, 122, 125 Middle East, 92, 111, 192 Manning, Bradley, 182 Military-industrial complex, 120, 199, 200 Mansha, Abu Bakr, 177 Millennial Generation, 146 Marine Base Quantico, 28 Minsky, Marvin, 64, 67 Marine Corps Intelligence, 25 Miramax, 182 Markoff, John, 40 Missile Defense Agency, 108 Marshalls, 126 Mission Impossible, 134 Mason–Pfizer monkey virus, 77 MIT. See Massachusetts Institute of Massachusetts, 125 Technology Massachusetts Institute of Technology, 64, Mixed-martial arts, 176 67, 100, 151, 167, 197, 203 MMA. See Mixed-martial arts, 176 Massachusetts state fusion center, 28 MMOG. See lmassively multiplayer online Massively Multi-Participant Intelligence game, 146 Amplification, 77 MMPIA. See Massively Multi-Participant Massively multiplayer online game, 146 Intelligence Amplification, 77 MasterCard, 124 MMS. See Multimedia messages, 133 Match.com, 88 Mobil Oil, 89 Mayer, Jonathan, 87 Modal logic, 68 McAfee, 133 Model-based reasoning, 68 McCain, John, 9, 27, 109 Mohammad, Raz, 198, 200 McCarthy, John, 63 Montana, 162 McChrystal, Stanley, 160 Moore, Michael, 91, 180, 182 McConnell, John Michael, 24 Morell, Michael, 27 McCoy, Dr., 176 Morgan M. Granger, 103 McDaniel, Rodney, 90 Moriarty, James, 200 Index 227

Moro Islamic Liberation Front, 206 National Institutes of Health, 56 Morphable model, 45 National Intelligence Council, 113, 162 Moss, Jeff, 89 National Intelligence Director, 22 Mossadegh, Mohammad, 167 National Oceanic and Atmospheric Motorola, 100 Administration, 111 Moussaoui, Zacarias, 17, 21 National Reconnaissance Office, 25 MS-ISAC. See Multi-State Information National Research Council, 103 Sharing and Analysis Center, 122 National Science Foundation, 56 MTA. See Metropolitan Transportation National security agency, 4, 7, 20, 51, 53, Authority, 184 55, 65, 102, 112, 120, 146, 147, 160 MTV, 146 National security branch, 25 Mubarak, Hosni, 91 National security council, 22, 38 Mueller, Robert, 100, 124 National weather service, 55 Multimedia messages, 133 NATO. See North Atlantic Treaty Multi-State Information Sharing and Analysis Organization, 75 Center, 122 Natural language, 4, 64, 67 Murphy, Wayne, 160 Naval Postgraduate School, 146 Murrah Federal Building, 165 Navy intelligence, 25 Murray, Joel, 8 Nazir, Abu, 8, 157, 160 Muslim Educational Cultural Center of NCEC. See National Cyber Security Education America, 176 Council, 122 Mutual authentication, 129 NCES. See National Center for Education MYCIN, 68 Statistics, 147 MyDoom, 101 NCMEC. See National Center for Missing and MySpace, 93 Exploited Children, 57 NCS. See U.S. National Communications System, 103 N NCSA. See National Cyber Security Alliance, Nagasaki, 198 122 Nakoula, Basseley Nakoula, 183 NCSAM. See National Cyber Security Nano Hummingbird, 86 Awareness Month, 121 Naquin, Douglas, 23 NCTC. See National Counterterrorism Center, NASDAQ, 102 22 National Academies, 103 Near field communications, 133 National Aeronautics and Space Need for Speed Most Wanted, The, 133 Administration, 111 Negahban, Navid, 8 National Center for Education Statistics, 147 Negroponte, John, 23 National Center for Missing and Exploited Neighborhood Watch, 77 Children, 57 Net Gen, 146 National Centers of Academic Excellence, 146 Netanyahu, Benjamin, 199 National Commission on American Netherland, 124 Cybersecurity Act of 2008, 119 Network latency, 144 National Counterterrorism Center, 22 Network mapping, 144 National Cyber Security Alliance, 122 Network topology, 144 National Cyber Security Awareness Month, Neural networks, 67, 76 121 Nevada, 107 National Cyber Security Education Council, New American Foundation, 159 122 New Jersey, 125 National Geospatial-Intelligence Agency, 25, New Left, the, 163 150 New York, 84, 86, 125, 162, 175 National Initiative for Cybersecurity New York City, 57, 65, 183 Education, 121 New York Civil Liberties Union, 86 National Institute of Standards and New York police department, 57, 65, 86, Technology, 121 103 228 Index

New York stock exchange, 102 O New York Times, 88, 111, 135, 182 Obama, Barack, 100, 104 Newton-Small, Jay, 204 Obama, Michelle, 208 Newtown, Connecticut, 180, 192 Object-oriented database, 67 NFC. See near field communications, 133 O’Brian, Chloe, 176 NGA. See National Geospatial-Intelligence Occucopter, 88 Agency, 25 Occupy Wall Street, 88 NHTCU. See Dutch National High Tech ODNI. See Office of the Director of National Crime Unit, 125 Intelligence, 55 NIC. See National Intelligence Council, 113, OEF-A. See Operation Enduring Freedom in 162 Afghanistan, 11 Nicaragua, 38, 167 Office of Intelligence and Analysis, 25 Niccol, Brian, 146 Office of National Security Intelligence, 25 NICE. See National Initiative for Office of the Director of National Intelligence, Cybersecurity Education, 121 23, 55, 83, 93 Nickelodeon, 147 Ohio, 183 NID. See National Intelligence Director, 22 OIA. See Office of Intelligence and Analysis, Nieto, Enrique Peña, 179 25 NIH. See National Institutes of Health, 56 Okkhoy, 177 Nimda, 100 Oklahoma City bombing, 4, 162, 165, 175, Nineteen Eighty-Four, 89 191, 192 NIST. See National Institute of Standards and Olson, Barbara, 157 Technology, 121 O’Neill, John, 18 Nitol, 132 One Team, One Fight, 22 Nixon, Richard, 53, 181 ONI. See Navy Intelligence, 25 Nixon, Steven, 51, 55, 56 ONI. See OpenNet Initiative, 92 Nobel Peace Prize, 185, 198, 199, 206 ONSI. See Office of National Security No-fly list, 21 Intelligence, 25 Nokia, 87 Open Source Agency. See Open Source Nolan, Christopher, 3 Center, 23 Nordstrom, Eric, 30 Open Source Center, 23 North Africa, 162 Open Web Application Security Project, 126 North Atlantic Treaty Organization, 75, 89, OpenNet Initiative, 92 151, 179, 205 Operating system, 130 North Carolina fusion center, 28 Operation Ajax, 167 North, Oliver, 38 Operation Cisco Raider, 109 Northeastern University, 146 Operation Desert Storm, 164, 175 Norway, 89, 162 Operation Enduring Freedom, 9 NRO. See National Reconnaissance Operation Enduring Freedom in Afghanistan, Office, 25 11, 198, 201 NSA. See National Security Agency, 4 Operation Iraqi Freedom, 89 NSA/CSS Information Assurance, 53 Operation Olympic Games, 105 NSA/CSS Network Warfare operations, 53 Operation Pillar of Defense, 110 NSA/CSS Signals Intelligence, 53 OpIsrael, 110 NSB. See National Security Branch, 25 Oracle, 130 NSC. See National Security Council, 38 Orange Revolution, 191 NSDD. See 1984 National Security Decision O’Reilly, Patrick J., 108 Directive, 37 Orwell, George, 43, 89, 174, 175 NSF. See National Science Foundation, 56 OSC. See Open Source Center, 23 NTP flood, 123 Oslo, 166 NYPD Counterterrorism Bureau, 57 OWASP. See Open Web Application Security NYPD. See New York Police Department, 57 Project, 126 NYSE. See New York Stock Exchange, 102 Oxford University, 64 Index 229

P Police drones, 88 Packet filtering, 145 Policy Analysis Market, 46, 54 Pakistan, 11, 30, 58, 90, 104, 158- 161, Political suicide, 7 168, 176, 184 Politically incorrect, 157, 181 PAL. See Perceptive Assistant that Learns, 64 Politics of Nonviolent Action, The, 185 PAL/CSS Freestyle Chess Tournament, 68 Pope Urban II, 176 Palantir Technologies, 56 Porter, Dave, 180 Palestinian territories, 108 POST floods, 123 Palin, Sarah, 129 Post-Traumatic Stress Disorder, 201 PAM. See Policy Analysis Market, 46 POTS. See Plain Old Telephone Service, 132 Panama, 124 POTUS. See President of the United States, 23 Panetta Leon E., 113 Powell, Colin, 9 Parameterized queries, 126 Power system research, 103 Partinico, Sicily, 191 PPC. See Plant Process Computer, 104 Password protection, 129 Predator drones, 107 Patriot Act, 11, 120 Predicate logic, 68 Pattern recognition, 45 Predictive modeling, 45 Pattern-recognition rules, 68, 71, 72 Prepared statements, 126 Pax Americana, 206 President of the United States, 23, 201, 203 Payment Card Industry, 126 PriceWaterhouseCoopers, 100 PayPal, 56, 128 Princeton University, 100 PCeU. See U.K. Police Central e-Crime Unit, Privacy Act of 1974, 40 125 Privacy protection, 45 PCI. See Payment Card Industry, 126 Privacy protection technologies, 41 PDF document, 130 Procter and Gamble, 102 Peace Corps, 12 Project Blitzkrieg, 102 Peace on Facebook, 203 Prolexic Technologies, 12, 123 Pearl Harbor, 9, 29, 44, 53 Prolog, 67 Pennsylvania, 124, 125 Prophet Mohammed, 183 Pentagon Papers, 181 Propositional logic, 68 People Magazine, 88 Prosthetic arm, 38 People’s Liberation Army, 111 Proxies, 123 Perceptive Assistant that Learns, 64 Psychology, 67 Persian Gulf, 162, 165 PTSD. See Post-Traumatic Stress Disorder, Persian Gulf War, 165, 175 201 Petraeus, David, 11, 90 PUSH floods, 123 Philadelphia, 183 Pushpin Mehina, 205 Phishing, 100, 127 Phone masters, 101 Phone phreak, 132 Q Phreak, 132 Qadir, Sheikh Aleey, 177 Pillar, Paul R., 167 Qatar, 110, 167, 199 PIN pad, 125 Queen Rania, 179 Pinkie Pie, 136 Quilliam (Foundation), 11 Pittsburgh, 183 Quote approval, 181 PLA. See People’s Liberation Army, 111 Quran, 166 Plain Old Telephone Service, 132 Plan X, 143 Plant Process Computer, 104 R PlayStation 3, 77 RAB. See Rapid Action Battalion, 177 PNC Bank, 110, 122 Racist terrorism, 183 Poindexter, John, 37, 54 Raja, Khadija, 177 PointRoll, 87 Raja, Usman, 177 230 Index

Rajskub, Mary Lynn, 176 S Raleigh Jihad, 28 SACEUR. See Supreme Allied Commander Rapid Action Battalion, 177 Europe, 179 Rapid Analytic Wargaming, 48, 56 Safari, 87 RasGas, 110 Safety Parameter Display System, 104 Rather, Dan, 181 Saleh, Amrullah, 161 RDBMS. See relational database management San Diego, 86 system, 126 San Diego County Water Authority, 112 Reagan, Ronald, 4, 37, 90, 92, 167 San Diego Gas and Electric, 112 Really Simple Syndication, 151 San Francisco, 52, 84 Real-time database, 67 Sandia National Laboratories, 135 Reaper drones, 107 Sandy Hook Elementary School, 164, 180, Reasoning from first principles, 68 192 Reasoning under uncertainty, 68 Sanger, David E., 104 Recommendation rules, 68, 72, 75 Santos, Juan Manuel, 179 Recovery high-voltage transformers, 103 Sarbanes-Oxley Act, 120 Reddit, 151 Sasser, 101 Reduced Instruction Set Computer, 110 Satellite Positioning System, 38 Relational database management system, 126 Saudi Arabia, 15, 165, 167, 175 Relational database, 67 Saujani, Reshma, 150 Relevant facet of behavior, 71, 72 SayNow, 91 Remote bricking, 134 SCADA. See Supervisory Control and Data Remote Terminal Units, 103 Acquisition, 103 Remote wipe, 134 Scheiber, Noam, 54 Renewable clean energy, 208 Schenck v. United States, 183 Reverse engineering, 110 Scheuer, Michael, 19, 160 Rhode Island, 125 Schouwenberg, Roel, 104 Rice, Condoleezza, 9 SCIENTIA EST POTENTIA, 39 Richelieu, or The conspiracy: in five acts, 183 Screensaver, 76 Riedel, Bruce, 30, 161 Scrubbing center, 123 Right-wing terrorism, 162 Seagal, Steven, 8 Ring of steel, 84 Search for Extraterrestrial Intelligence, 76 RIP flood, 123 Search for Trespassers and Suspects, 77 RISC. See Reduced Instruction Set Computer, Seattle, 88 110 Seattle poolice department, 28 Robotic hummingbird, 38 Secret service, 107 Rockefeller, Jay, 120 SECTF. See Social Engineering Capture the Rodriguez, Jose, 27 Flag, 149 ROE. See rules of engagement, 145 Secure software architecture, 144 Romesha, Clint, 208 SecurID, 100, 124 Romney, Mitt, 159, 181, 206 Security questions, 129 Rotenberg, Marc, 40 Self-driving cars, 151 Rousseff, Dilma, 179 Semantic Traffic Analyzer, 52 Routers, 123 Senate Armed Services Committee, 27 Routing table, 144 Senate Committee on Armed Services, 39 RSA, 124 Senate Intelligence Committee, 27 RSS. See Really Simple Syndication, 151 Senate Judiciary Subcommittee on Terrorism, RTUs. See Remote Terminal Units, 103 Technology, and Homeland Security, Rudolph, Eric, 165, 192 113 Rules of engagement, 145 Sender policy framework, 128 Rumsfeld, Donald, 8, 90, 175 Serbia, 165 Russell, Kurt, 8 SETI@home, 76 Russia, 124, 128, 163, 179 SHA-1, 125 Russian roulette, 133 Sharkey, Brian, 38 Index 231

Sharp, Gene, 185 Spitzer, Ulf, 89 Shays, Christopher, 90 Spock, Mr., 174, 176 Sheba Medical Center, 200 Spoofing, 100 Sherlock Holmes: A Game of Shadows, 200 Sprint, 100 Sicilian Gandhi, 191 Sputnik, 38 Siemens, 104 Spyware, 88, 100, 132 SIGKDD. See Special Interest Group on SQL injection, 125 Knowledge Discovery and Data SQL Slammer, 104 Mining, 66 SQL. See Structured Query Language, 126 Silence of the Lambs, The, 158 SQLIA. See SQL injection, 125 Simons, Barbara, 42 Sri Lanka, 164 Sinai Peninsula, 162 SSl GET floods, 123 Singapore, 88 SSl POST floods, 123 Singapore Government Network, 100 Stahl, Lesley, 167 SirCam, 101 Stanford University, 77 Siri, 64 Stanford University, 87 Six Flags, 84 Star Trek II: The Wrath of Khan, 176 Skype, 110, 133 Star Trek, 64 Sleep deprivation, 28 Starling, Clarice, 158 SLTT. See state, local, tribal, and territorial, Stasi, 52 122 State, local, tribal, and territorial, 122 Slumdog Millionaire, 177 State-sponsored assassinations, 167 Smartphone, 133, 134 State-sponsored terrorism, 168, 198 SmartScreen Filter, 130 Statistics, 66 Smith, Benjamin, 90 Stavridis, James, 151, 179, 197, 205 Smith, Sean, 11 STE. See Syrian Telecommunications SoBig, 101 Establishment, 110 Social engineering, 126, 127 Stealth technology, 38, 110 Social Engineering Capture the Flag, 149 Steinert, Bernd, 87 Socialism, 165 Stevens, J. Christopher, 11, 29, 176 Soghoian, Christopher, 57, 151 Stingray, 135 Soltani, Ashkan, 87 Stockton, Paul, 102 Sontag, Susan, 181 Stored procedures, 126 Sony Pictures Entertainment, 27 Storm, Morten, 93 Sony PlayStation Network, 125, 127 Story of My Experiments with Truth, Sony PlayStation, 102 The, 185 Sony, 77, 120 Storytelling, 45 Soufan, Ali, 15, 18, 27, 178, 183 Strangelove, Dr., 40 Southwestern Bell, 101 Structural topology, 70 Soviet war in Afghanistan, 164 Structured Query Language, 126 Spain, 162 STS. See Search for Trespassers and Suspects, Spam attack, 124 77 Spam, 133 STS@home, 77 SpamSoldier, 131 , 104, 109, 131, 146 Spatial database, 67 Suicide, 201 SPDS. See Safety Parameter Display System, Sulzberger, Arthur Ochs “Punch”, 181 104 Supervisory Control and Data Acquisition, Spear phishing, 127 103, 112 Special Interest Group on Knowledge Supreme Allied Commander Europe, 179, Discovery and Data Mining, 66 205 Speech-to-text transcription, 45 Surowiecki, James, 46 Spencer, Robert, 184 Susman, Louis, 182 SPF. See Sender Policy Framework, 128 Sutherland, Kiefer, 19, 176 Spielberg, Steven, 63 Swanson, Jeffrey, 164 232 Index

Swartz, Aaron, 151 TIDES. See Translingual Information Sweden, 88 Detection, Extraction and Symantec, 133, 135 Summarization, 41 Symphony, 48, 56 Timestamp, 67 SYN floods, 123 Time-To-Live, 144 SYN PUSH floods, 123 Timms, Stephen, 184 Syracuse University, 4, 165 TIPOFF terrorist watchlist, 21 Syria, 91, 110, 162, 191 Titan supercomputer, 64 Syrian Telecommunications Establishment, TJX Companies, 124, 126 110 TMZ, 88 tokenization, 126 Tokyo Stock Exchange, 102 T Tolstoy, Leo, 200 Tablet computing, 146 Topological clustering rules, 68, 72, 74 Taco Bell, 146 Topological pruning rules, 68, 72 Tafoya, William L., 112 Total Information Awareness, 40, 43, 44, 51, Tailored Access Operations, 112 56, 83, 89, 91, 183 Taiwan, 89, 206 Touch user interface, 146 Taliban, 9, 30, 160, 162, 174, 198 Tower Commission, 38 Tamil Tigers, 164 Tower, John, 38 Tanzania, 15, 175 Townsend, Fran, 29 Tata Communications, 123 Toyota, 151 Taylor, Scott, 90 TPAJAX. See Operation Ajax, 167 TCP fragment floods, 123 Traceroute, 144 TCP Reset floods, 123 Translingual Information Detection, TED 2009, 179 Extraction and Summarization, 41 TED 2012, 38, 136 Tripoli, 29 TEDGlobal 2012, 102, 157, 162, 174, 197, , 101, 110, 131 201 Truman, Harry, 53 Tel Aviv, 200, 204 truth maintenance, 45 Temporal database, 67 TRW, 101 Temporal logic, 68 TSC. See Terrorist Screening Center, 21 Tenet, George, 20 TTL. See Time-To-Live, 144 Terrorist Mind, 164 TUI. See Touch user interface, 146 Terrorist Screening Center, 21, 66 Tunisia, 167 Terrorist Surveillance Program, 51 Turkey, 167, 176, 199 Terrorist sympathizers, 166 Twitter, 86, 88, 91, 126, 128, 133, 150, Terrorist Threat Integration Center, 22 179, 205 Test points restriction, 74 Two-factor authentication, 129, 135 Tether, Tony, 39 Two-way authentication, 129 THAAD interceptor, 108 THAAD. See Theater High-Altitude Area Defense, 108 U Thailand, 89 U.K. Police Central e-Crime Unit, 125 Theater High-Altitude Area Defense, 108 U.N.. See United Nations, 92 Theorem proving, 67 U.S. Air Force, 76, 107, 111, 112 Thiel, Peter, 56 U.S. Armed Forces, 53 Things That Connect Us, The, 85 U.S. Army Research Office, 69 Thomas, Clarence, 8 U.S. Army, 8, 111 Thomas, Michael Lane, 101 U.S. Bank, 110, 122 Thompson, Hugh, 133 U.S. Constitution, 52, 54 Thoreau, Henry David, 174 U.S. Cyber Command, 102, 133 Thornburgh, Dick, 51, 54 U.S. Cyberspace Policy Review, 120 TIA. See Total Information Awareness, 40 U.S. Department of Commerce, 111 Index 233

U.S. Department of Defense, 103, 107, 121, University of Arizona, 75 143 University of California, 100 U.S. Department of Homeland Security, 122, University of California, Berkeley, 76 128 University of Chicago, 203 U.S. electric power grid, 103 University of Portsmouth, 65 U.S. European Command, 179, 205 University of Southern California, 8 U.S. Forces Afghanistan, 160 University of Tulsa, 146 U.S. General Services Administration, 109 University of Virginia, 100 U.S. Geological Survey, 56 Unix, 110 U.S. Internal Revenue Service, 100 Unmanned Aerial Systems, 76, 158 U.S. Justice Department, 20, 30 Unmanned Aerial Vehicles, 76, 158 U.S. Library of Congress, 86 Unstructured database, 67 U.S. Marine Corps, 111 US Bank, 128 U.S. Marshals, 124 USA PATRIOT Act of 2001, 11 U.S. National Communications System, 103 USC. See University of Southern U.S. Naval Research Laboratory, 69 California, 8 U.S. Navy SEALs, 11, 90, 109, 161 US-CERT. See United States Computer U.S. Navy, 111, 112 Emergency Readiness Team, 128 U.S. Secret Service, 125, 135 USEUCOM. See U.S. European Command, U.S. Secretary of the Treasury, 164 179 U.S. Senate Armed Services Committee, 108 USFOR-A. See U.S. Forces Afghanistan, 160 U.S. Senate Commerce Committee, 120 USS Cole, 9, 18 U.S. Senate Committee on Homeland Security, USSC. See U.S. Sentencing Commission, 151 55 USSS. See U.S. Secret Service, 125 U.S. Senate Intelligence Committee, 120 Utoeya Island, 166 U.S. Senate, 111 U.S. Sentencing Commission, 151 U.S. State Department, 17, 21, 25, 30, 204 V U.S. Supreme Court, 181, 183 Van Dyck, Rebecca, 85 U.S. troop surge, 160 VBTS. See virtual base transceiver station, U.S.-China Economic and Security Review 135 Commission, 111 VeriSign, 123 UAE. See United Arab Emirates, 179 Verizon RISK Team, 125 UAS. See Unmanned Aerial Systems, 76 Verizon, 53, 100 UAVs. See Unmanned Aerial Vehicles, 76 Very large-scale integrated circuits, 70 UBS, 102 Vibrant Media, 87 UDP floods, 123 Video surveillance, 84 UDP fragment floods, 123 Vietnam, 11, 164 Ukraine, 124, 191 Vietnam War, 181 Unabomber, 166 Vincent, Luc, 88 UNICEF. See United Nations Children’s Fund, Virginia Tech, 4, 130, 150, 164 173 Virtual base transceiver station, 135 United Arab Emirates, 179 Virtual Private Network, 106 United Kingdom, 84, 89, 128, 162, 175 Virtual worlds, 112 United Methodist Women, 185 Virus, 101 United Nations, 91, 92, 199 VirusBlokAda, 104 United Nations Children’s Fund, 173 Visa, 124 United Nations Security Council, 167 Visual Casino loss-reduction systems, 84 United States Computer Emergency Readiness Visualization, 66 Team, 128 VLSI. See very large-scale integrated circuits, United States, 88, 102, 104, 108, 111, 128, 70 150, 162, 175, 205 Voice over Internet Protocol, 52 Universal Declaration of Human Rights, 92, VoIP. See Voice over Internet Protocol, 52 207 VPN. See Virtual Private Network, 106 234 Index

W White, Mary Jo, 20 Waco siege, 165, 175, 191 White-hat hacker, 136 Wadsworth, Steve, 5 WHO. See World Health Organization, 173 WAE. See Wargaming the Asymmetric Wi-Fi, 131, 134 Environment, 41 WikiLeaks, 57, 86, 89, 90, 90, 93, 182 Walden; or, Life in the Woods, 174 Wikipedia, 89, 91, 92 Wales, Jimmy, 91 Wilde, Oscar, 8 Wall Street Journal, 111 Wilson, James, 55 Wal-Mart, 126 Winter, Prescott, 111 Walsh, John, 76 WMD. See weapon of mass destruction, 163 Walt Disney Company Foundation, 6 Woods, Tyrone, 11 Walt Disney Company, The, 182, 201 WOPR. See War Operation Plan Response, Walt Disney Imagineering, 7, 55 150 Walt Disney Internet Group, 5 World Bank, 100 War and Peace, 200 World Conference on International War games, 150 Telecommunications, 91 War of Attrition, 163 World Court, 167 War on terror, 12, 39, 72, 160 World Health Organization, 173 War Operation Plan Response, 150 World Trade Center bombing, 4 WarGames, 150 World War II, 53, 54, 198, 207 Wargaming the Asymmetric Environment, 39, World War III, 150 41, 48, 56 Worm, 101 Wargaming, 145 Wright, Lawrence, 56, 83 Warrantless wiretapping, 54 Wyden, Ron, 47 Washington D.C., 183 Washington state fusion center, 28 Washington, 162 Y Washington, George, 191 Yaffe, Batia, 200 Wasielewski, Philip G., 164 Yahoo!, 86, 100, 111, 128 Waterboarding, 28 Yahoo! Voices, 125 Watson, Thomas J., 64 Yellow Pages, 88 WCIT. See World Conference on International Yemen, 9, 90, 93, 159, 162, 166, 175, 184 Telecommunications, 91 Yousafzai, Malala, 201 We Are Hungry, 180 Youssef, Mark Basseley, 11 Weapon of mass destruction, 99, 100, 163 YouTube, 87, 89, 159, 183, 184 Weapon of mass disruption, 99 Weaponized software, 104 Web-Free Speak-To-Tweet Service, 91 Z WebMD, 88 Zazi, Najibullah, 58 Wells Fargo Bank, 100, 110, 122 ZDNet.com, 101 Wertheimer, Michael, 93 Zero Dark Thirty, 27 West Virginia, 162 Zero-day bugs, 104 Whiskey Rebellion, 192 Zeus, 124 White House, 89, 208 Zionists, 165 White House Office of Science and Zombie computer, 124 Technology Policy, 56 Zuckerberg, Mark, 147, 174, 180, 205