Cc Index.Pdf
Total Page:16
File Type:pdf, Size:1020Kb
Index Symbols 2010 Times Square car bombing attempt, 189 song), 123 2011 f8 Conference, 173) صلاخ قشع 강남스타일 (song), 123 2011 State of the Union Address, 184 Biдлyння мpiй (song), 123 2011 USENIX Security Symposium, 315 #JewsAndArabsRefuseToBeEnemies, 125 2012 Aspen Security Forum, 206, 301 #myfirstpaycheck, 276 2012 Benghazi attack, 12, 86 /dev/ttyS0, 217 2012 Black Hat Conference, 189, 217, 256 2012 presidential election, 184 2012 RSA Conference, 202 0–9 2013 Black Hat conference, 82 4Deck, 425 2013 RSA conference, 174 7 Seconds (song), 123 2013 State of the Union Address, 111 9/11 attacks, 3, 12, 38, 46 2013 TechCrunch Disrupt Conference, 174 9/11 Commission, 28 2014 Black Hat Conference, 268 9/11 Commission Report, 52 2014 DEF CON Diversity Panel, 313 12 Years a Slave (film), 223 2014 RSA conference, 175 24 2015 Consumer Electronics Show, 15, 231, Live Another Day, 78, 227 312 24 (TV series), 8, 26, 78, 80 2015 DEF CON Diversity Panel, 314 64-bit counter, 123 100 Day Plan for Integration and Collaboration, 32 A 198 methods of nonviolent action, 88, 95 @AP, 203 500 Day Plan for Integration and Aaron Brothers, 258 Collaboration, 32 Aaron’s, 269 1983 Beirut barracks bombing, 63 Aaron’s Law, 316 1984, 141 Abbott, Tony, 99 1984 National Security Decision Directive Abbas, Mahmoud, 62, 76 138, 136 Abbottabad, Pakistan, 11, 53, 220 1985 Beirut car bombing, 63 ABC, 48, 84 1996 Summer Olympics, 55 Abduction, 328 2001 Abortion clinics, 60 A Space Odyssey, 324 Abu Ghraib, 61, 118 2003 Northeast blackout, 207 Academy Award, 46, 123, 125 2008 presidential campaign, 212 Accumulo, 214 2009 Supplemental-War Funding Bill, 159 Accuvant, 217 2010 Flash Crash, 435 Achieve Cybersecurity Together, 252, 254 © Springer International Publishing Switzerland 2015 457 N. Lee, Counterterrorism and Cybersecurity, DOI 10.1007/978-3-319-17244-6 458 Index ACK. See Acknowledgement Air Force Intelligence, Surveillance, and Acknowledgement, 352 Reconnaissance, 32 ACLU. See American Civil Liberties Union Air Force Research Laboratory, 49 ACM. See Association of Computing Air traffic control, 215, 315 Machinery Aitel, Dave, 274 ACM Computers in Entertainment, 122 Akdogan, Yalcin, 62, 88 Acquired immune deficiency syndrome, 337 Al-Abadi, Haider, 52 ACT. See Achieve Cybersecurity Together Al-Aqsa Mosque, 59 Ada, 213, 215 Al-Ashja’i, Rakan, 83 Ad Age, 185 Al-Asiri, Ibrahim, 53 Ada Mandate, 213 Al-Assad, Bashar, 221, 222 Ada Programming Support Environment, 4, Al-Awlaki, Anwar, 49, 53, 60, 87, 193 213 Al-Bahri, Nasser, 26, 80 ADAMS. See Anomaly Detection at Multiple Albert Einstein Institution, The, 89 Scales Albright, Madeleine, 63 Addams Family, The (film), 229 Alcoa, 224 Address Resolution Protocol, 208 Aldrin, Buzz, 126 Address Space Layout Randomization, 267 Alexander, Keith, 82, 169, 206, 249, 272, 301, Adebolajo, Michael, 225 309, 313 Adebowale, Michael, 225 Algeria, 54, 62 Adichie, Chimamanda Ngozi, 45, 62, 64, 81 Al-Hazmi, Nawaf, 25, 28 Adobe, 256, 257 Alijazeera, 56 Adobe Acrobat, 267 Ali, Wajahat, 77 Adobe Flash, 267 Al-Jaabari, Ahmed, 109 Adobe Reader, 267 Al Jazeera, 23, 77, 88 ADS-B. See Automatic Dependent Alkemade, Thijs, 271 Surveillance - Broadcast system Alkhouri, Laith, 47 Advanced Research Projects Agency, 136 Allah, 49 Advanced Research Projects Agency Network, Allegheny Technologies, 224 137 Allen, Ernie, 157 Advanced persistent threat, 202 Al-Libi, Abu Yahya, 12, 76 AeroVironment, 186 Al-Mihdhar, Khalid, 25, 28, 142 Aesop, 29, 75, 80 Al-Muslimi, Farea, 45, 51 AFDI. See American Freedom Defense Al-Najadi, Abu Mus’ab, 56 Initiative Alperovitch, Dmitri, 221, 223, 255 A Few Good Men (film), 21 Al-Qaeda, 11, 34, 49–52, 54, 58, 61, 74, 142, Afghanistan, 11, 39, 47, 50, 54–56, 59, 61, 74, 190, 202, 225 87, 108, 110, 111, 212, 227, 327 Al-Qaeda in the Arabian Peninsula, 8, 60 Afghan Peace Volunteers, 81, 108 Al-Qaeda in the Islamic Maghreb, 54 AF ISR. See Air Force Intelligence, Al-Qaradawi, Yusuf, 58 Surveillance, and Reconnaissance Al-Quso, Fahd, 26 AFP. See Australian Federal Police Al-Raimi, Qassim, 8 African, 123 Al-Sharia, Ansar, 12, 76 Aftergood, Steven, 85 Alternative energy, 137 Agent.btz, 212 Al-Wuhayshi, Basir, 60 Ahmad, 158 Al-Zawahiri, Ayman, 54 A Higher Call, 111 Alzheimer’s disease, 337 AI. See Artificial intelligence Amanpour, Christiane, 52 A.I. Amazon.com, 202, 257, 259, 261, 264 Artificial Intelligence (film), 324 Ambassador, 125 AIDS. See Acquired immune deficiency AMC, 13, 206, 229 syndrome Amelie (film), 123 Air Force Institute of Technology, 308 America at war, 9 AIG. See American International Group American, 46 Index 459 American Civil Liberties Union, 152, 157, 316 Arab-Israeli conflict, 121 American Civil War, 111 Arabic, 123 American Freedom Defense Initiative, 87 Arabic language, 26, 143 American International Group, 227 Arab Spring, 54, 95, 192 American Muslim, 59 Arafat, Yasser, 146 American Revolution, 81 Aramco, 221 American Sniper, 74 Arash. See Labaf, Arash Americans, The (TV series), 46, 223 Arduino, 360, 411 American University, 116 Argentina, 82, 156 America’s Most Wanted, 337 Argo (film), 221 Aminah, 60, 193 Argus, 155 Amnesty International, 50, 118, 262 Ariane 5, 437 Amsterdam, 115 Aristophanes, 96 Analytic Space, 193 Arkin, Brad, 257 Analytical models, 329, 330, 332, 333 Armstrong, Neil, 122, 126 Anarchist terrorism, 54 Armstrong, Tim, 177 Anderson Cooper 360°, 38 Army Intelligence, 32 Anderson, L.V., 96 Arnold, Douglas N., 437 Anderson, Sulome, 125 ARP. See Address Resolution Protocol Android, 187, 218, 309, 315 ARPA. See Advanced Research Projects Andrus, Calvin, 192 Agency Angry Birds Space, 268, 270 ARPANET. See Advanced Research Projects Angry Birds Star Wars, 271 Agency Network Animal Farm (film), 64 ARP spoofing, 208 Annie (film), 228 Arquette, Patricia, 274 Anomaly Detection at Multiple Scales, 156 Arranged marriage, 125 Anonymizer, 161 Arrow III missile, 212 Anonymous, 47, 76, 221, 256, 259, 309, 316 Ars Technica, 218 Ansar al-Sharia, 86 Artificial cardiac pacemaker, 226 Anti-colonial terrorism, 55 Artificial immune system, 451 Anti-malware definitions, 269 Artificial intelligence, 4, 158, 323, 326, 327, 329 Anti-Phishing Working Group, 263 Asia, 119, 188 AOL, 162, 187, 258 Asimov, Isaac, 324 AP. See Associated Press ASLR. See Address Space Layout Apache Foundation, 215 Randomization Apatow, Judd, 228 A-Space, 193 Apollo 11, 122 Aspen Institute Security Conference, 34 Apple, 162, 173, 214, 261, 264, 267, 268 Aspen Security Forum, 74, 332 Apple App Store, 268 Assange, Julian, 85, 86, 173, 186, 191, 193 AppleID, 261 Assassination, 52, 53, 63, 97 Apple malware, 269 Assembly language, 453 Apple Pay, 274 Associated Press, 203 Applied Cryptography, 431 Association for Computing Machinery, 141, App Store, 271 326 APSE. See Ada Programming Support Asymmetrical warfare, 346 Environment Atkins, Christopher R., 83, 191 APT. See Advanced persistent threat Atlanta, 55, 186 APWG. See Anti-Phishing Working Group AT&T, 123, 153, 154, 202 AQAP. See al-Qaeda in the Arabian Peninsula Atta, Mohammed, 26 AQIM. See al Qaeda in the Islamic Maghreb Attack vector, 344 Aquino, Benigno, 116 Auburn University, 308 AR. See Augmented reality Augmented reality, 308 Arab, 125 AUMF. See Authorization for the Use of Arabian Peninsula, 54 Military Force 460 Index Auriemma, Luigi, 261 Barkun, Michael, 60 Aurora, Colorado, 58 Barnes and Noble, 257 Aurora theater shooting, 9 Barr, Tara Lynne, 9 Australia, 98, 156 Barsamian, David, 62 Australian Federal Police, 260 Barstow, Martin, 124 Austria, 59 Base transceiver station, 274 Authorization for the Use of Military Force, Bash shell, 214 63 Basic Input/Output System, 217 Automated Speech and Text Exploitation in Battle for public opinion, 221 Multiple Languages, 147, 156 Battle of Fredericksburg, 109 Automated defenders, 446 Bauer, Jack, 26, 78, 80, 227 Automated teller machine ATM, 184 BBC News, 59, 98 Automated teller machine, 203, 338 Bcrypt, 266 Automatic Dependent Surveillance - Bdeir, Ayah, 312 Broadcast system, 315 BeagleBoard-xM, 425 Automation, 430 BeagleBone, 425 Automobile, 216, 315 BeagleBone Black, 422 Autonomous analysis, 453 Behavioral causality, 331 Autonomous Network Defense, 454 Beirut Marathon Association, 112 Autonomous Patching, 453 Beirut, 63 Autonomous Service Resiliency, 454 Belasco, Amy, 142 Autonomous Vulnerability Scanning, 454 Belgium, 58 AVG, 309 Bell Laboratories, 4, 123, 126, 220 Avner, Carmela, 201, 221 BellSouth, 154 AVR microcontroller, 411 Benghazi, 38 Axelson, Jan, 351, 360 Benghazi, Libya, 12, 38, 54, 76 Azerbauan, 208 Ben-Itzhak, Yuval, 309 Bergen, Peter, 35, 49, 58 Berry, Halle, 8 B Beslan school hostage crisis, 36 Babbage, Charles, 213 Betty Boop, 265 Babylon, 147, 156 BGP. See Border Gateway Protocol Babylonian Empire, 75 Bharara, Preet, 206 Bacile, Sam, 87 Bibi, Mamana, 50 Backdoor, 173, 174, 217 Bidirectional authentication, 264 Backdoor.Agent.RS, 274 Big Brother, 141, 184, 189 Backward chaining, 328 Big data, 184, 214, 326 Bacon, Sir Francis, 78 Big Data Research and Development BadUSB, 349 Initiative, 156, 326 Baghdad, 76 Bill & Melinda Gates Foundation, 74 Bakker, Jim, 77 Bill of Rights, 152 Ballistic Missile Defense System, 218 Bin Abdulaziz, Sultan, 23, 76 Bamford, James, 160 Bin Laden of the Internet, 53, 87, 193 Ban, Ki-moon, 88, 110 Bin Laden raid, 190, 220 Bandwidth, 352 Bin Laden, Osama, 9, 10, 23, 33, 52–54, 56, Bandwidth over-provisioning, 253 59, 76, 78, 81, 98, 190 Bangkok, 28 Bin Laden, Usama. See Bin Laden, Osama Bank fraud, 206 Binney, William, 153 Banking, 215 Bin Rashid Al Maktoum, Mohammed, 82 Bank of America, 221, 253