|
Part I Counterterrorism History: Then and Now |
|
|
|
|
3 | (18) |
|
|
3 | (3) |
|
1.2 Disney's Responses to the 9/11 Attacks |
|
|
6 | (1) |
|
1.3 FBI Warning of Hollywood as a Terrorist Target |
|
|
7 | (1) |
|
1.4 Holly wood Realism on Terrorism |
|
|
8 | (1) |
|
1.5 A New Day of Infamy and America at War |
|
|
9 | (3) |
|
|
12 | (1) |
|
1.7 Sony-pocalypse: Invoking 9/11 Attacks in Cyber Terrorism |
|
|
12 | (9) |
|
|
16 | (5) |
|
2 U.S. Intelligence Community |
|
|
21 | (24) |
|
2.1 "Need to Know" --- Truths, Half Truths, and Lies |
|
|
21 | (2) |
|
2.2 FBI Ten Most Wanted Fugitive: Osama Bin Laden |
|
|
23 | (2) |
|
2.3 An American Hero Born in Lebanon |
|
|
25 | (1) |
|
2.4 The FBI-CIA Bureaucratic Rivalries |
|
|
26 | (2) |
|
2.5 Operational Failures of the U.S. Intelligence Community |
|
|
28 | (1) |
|
2.6 Unity of Counterterrorism Effort Across U.S. Government |
|
|
29 | (2) |
|
2.7 Transition from Need-to-Know to Need-to-Share and Need-to-Provide |
|
|
31 | (3) |
|
2.8 Informed Interrogation Approach |
|
|
34 | (1) |
|
|
35 | (1) |
|
2.10 International Collaboration on Counterterrorism |
|
|
36 | (1) |
|
2.11 Hard Lessons from Pearl Harbor and 9/11 |
|
|
37 | (8) |
|
|
39 | (6) |
|
Part II Counterterrorism Strategies: Causes and Cures, War and Peace |
|
|
|
3 Understanding Terrorism |
|
|
45 | (28) |
|
3.1 "Give a Human Face to People We Consider Our Enemies" --- The Americans |
|
|
46 | (2) |
|
3.2 Bravery and Cowardice |
|
|
48 | (1) |
|
3.3 Drones Kill Terrorists, not Terrorism |
|
|
49 | (3) |
|
3.4 War on Terror (Overseas Contingency Operation) |
|
|
52 | (1) |
|
|
53 | (2) |
|
3.6 Economic and Psychological Warfare |
|
|
55 | (3) |
|
3.7 Inside the Minds of Terrorists and Their Sympathizers |
|
|
58 | (4) |
|
3.8 Questioning Terrorism and Destroying Stereotypes |
|
|
62 | (11) |
|
|
64 | (9) |
|
|
73 | (34) |
|
4.1 Terrorism as a Disease |
|
|
73 | (2) |
|
4.2 "Revenge Is Sour" --- George Orwell |
|
|
75 | (3) |
|
4.3 "Govern Your Passions or They Will Be Your Undoing" --- Mr. Spock |
|
|
78 | (1) |
|
4.4 "Impossible to Carry a Grudge and a Big Dream at the Same Time" --- Unknown |
|
|
79 | (1) |
|
4.5 "Every Truth Has Two Sides" --- Aesop |
|
|
80 | (2) |
|
4.6 "Give Everyone a Voice" --- Mark Zuckerberg |
|
|
82 | (2) |
|
4.7 "The Only Security of All Is in a Free Press" --- Thomas Jefferson |
|
|
84 | (2) |
|
4.8 "Free Speech Would not Protect a Man Falsely Shouting Fire" --- Oliver Wendell Holmes, Jr. |
|
|
86 | (2) |
|
4.9 "198 Methods of Nonviolent Action" --- Gene Sharp |
|
|
88 | (8) |
|
4.10 "We Do not Have the Right to Resort to Violence When We Don't Get Our Way" --- President Bill Clinton |
|
|
96 | (2) |
|
4.11 "Peace Is the Only Path to True Security" --- President Barack Obama |
|
|
98 | (9) |
|
|
99 | (8) |
|
|
107 | (28) |
|
5.1 War as State-Sponsored Terrorism |
|
|
108 | (1) |
|
|
109 | (1) |
|
|
110 | (1) |
|
5.4 Civilians Wanting Peace |
|
|
111 | (1) |
|
5.5 Peace Entailing Sacrifice |
|
|
112 | (3) |
|
|
115 | (2) |
|
5.7 A Just and Lasting Peace |
|
|
117 | (2) |
|
5.8 Peace and Friendships on Facebook |
|
|
119 | (3) |
|
5.9 One Small Step for an Individual; One Giant Leap for Humankind |
|
|
122 | (4) |
|
|
126 | (9) |
|
|
128 | (7) |
|
Part III Counterterrorism Technologies: Total Information Awareness |
|
|
|
6 The Rise and Fall of Total Information Awareness |
|
|
135 | (16) |
|
6.1 President Ronald Reagan and Admiral John Poindexter |
|
|
135 | (1) |
|
6.2 Defense Advanced Research Projects Agency (DARPA) |
|
|
136 | (1) |
|
6.3 Information Awareness Office (IAO) |
|
|
137 | (1) |
|
6.4 Perception of Privacy Invasion |
|
|
138 | (1) |
|
6.5 Privacy Protection in Total Information Awareness (TIA) |
|
|
139 | (2) |
|
6.6 Opposing Views on TIA |
|
|
141 | (2) |
|
6.7 Demystifying IAO and TIA |
|
|
143 | (2) |
|
6.8 Demise of IAO and TIA |
|
|
145 | (6) |
|
|
147 | (4) |
|
7 The Afterlife of Total Information Awareness and Edward Snowden's NSA Leaks |
|
|
151 | (32) |
|
7.1 NSA's Terrorist Surveillance Program |
|
|
152 | (1) |
|
7.2 President George W. Bush and NSA Warrantless Wiretapping |
|
|
153 | (2) |
|
7.3 Poindexter's Policy Analysis Market |
|
|
155 | (1) |
|
7.4 Project Argus: Bio-surveillance Priming System |
|
|
155 | (1) |
|
7.5 President Barack Obama's Big Data R&D Initiative |
|
|
156 | (1) |
|
7.6 Palantir Technologies Funded by CIA's in-Q-Tel |
|
|
157 | (1) |
|
7.7 Microsoft and NYPD's Domain Awareness System |
|
|
158 | (1) |
|
7.8 NSA's Utah Data Center: A $1.5 Billion Data-Mining and Spy Center |
|
|
158 | (3) |
|
7.9 Global Surveillance and Abuse of Power |
|
|
161 | (1) |
|
7.10 Edward Snowden's NSA Leaks and PRISM |
|
|
162 | (11) |
|
7.11 Social Networks' Responses to NSA Leaks and PRISM |
|
|
173 | (3) |
|
7.12 Reform Government Surveillance and Reset the Net |
|
|
176 | (7) |
|
|
177 | (6) |
|
8 A Two-Way Street of Total Information Awareness |
|
|
183 | (18) |
|
8.1 It's a Small World, with CCTVs |
|
|
183 | (1) |
|
8.2 Facebook Nation: Total Information Awareness |
|
|
184 | (2) |
|
8.3 Surveillance Satellites, Tracking Devices, Spy ware, and Drones |
|
|
186 | (3) |
|
8.4 A Two-Way Street of Total Information Awareness |
|
|
189 | (2) |
|
8.5 No Doomsday for the Internet |
|
|
191 | (1) |
|
8.6 Web 2.0 for Intelligence Community: Intellipedia, A-Space, Deepnet |
|
|
192 | (9) |
|
|
193 | (8) |
|
Part IV Cybersecurity: History, Strategies, and Technologies |
|
|
|
9 Cyber Warfare: Weapon of Mass Disruption |
|
|
201 | (48) |
|
9.1 Weapon of Mass Disruption |
|
|
202 | (1) |
|
|
203 | (3) |
|
9.3 Infrastructure Disruption |
|
|
206 | (5) |
|
9.4 Government and Military Disruption |
|
|
211 | (4) |
|
9.5 Shodan and the Internet of Things |
|
|
215 | (2) |
|
9.6 Backdoors and Counterfeit Parts |
|
|
217 | (2) |
|
9.7 Proliferation of Cyber Weapons and Reverse Engineering |
|
|
219 | (1) |
|
9.8 Cyber Espionage and Escalation of Cyber Warfare |
|
|
220 | (3) |
|
|
223 | (1) |
|
9.10 Psychological Cyber Warfare |
|
|
224 | (1) |
|
9.11 Cyber Terrorism and Digital Pearl Harbor |
|
|
225 | (2) |
|
9.12 Sony-pocalypse: from Cyber Attacks to Cyber Terrorism |
|
|
227 | (4) |
|
9.13 Good, Bad --- Internal/External --- People Put an End to Business as Usual |
|
|
231 | (18) |
|
|
|
238 | (11) |
|
10 Cyber Attacks, Prevention, and Countermeasures |
|
|
249 | (38) |
|
|
250 | (1) |
|
10.2 Cybersecurity Initiatives: CNCI, NICE, Presidential Executive Order |
|
|
251 | (1) |
|
10.3 National Cyber Security Awareness Month (NCSAM) |
|
|
252 | (1) |
|
10.4 Mitigation from Denial of Service (DoS, DDoS, DRDoS) Attacks |
|
|
253 | (2) |
|
10.5 Data Breach Prevention |
|
|
255 | (7) |
|
10.6 Fighting Back Against Phishing and Spoofing |
|
|
262 | (2) |
|
10.7 Password Protection and Security Questions |
|
|
264 | (3) |
|
10.8 Software Upgrades and Security Patches |
|
|
267 | (1) |
|
10.9 Fake Software and Free Downloads |
|
|
268 | (2) |
|
10.10 Smartphone Security Protection |
|
|
270 | (4) |
|
10.11 Cybersecurity Awareness: Everyone's Responsibility |
|
|
274 | (13) |
|
|
276 | (11) |
|
11 Cybersecurity Training in Medical Centers: Leveraging Every Opportunity to Convey the Message |
|
|
287 | (14) |
|
|
|
|
287 | (1) |
|
11.2 Healthcare Cyber Attacks |
|
|
288 | (1) |
|
11.3 Value of Medical Data to Cybercriminals |
|
|
288 | (1) |
|
11.4 Major Threats to Medical Data in Clinical Environments |
|
|
289 | (1) |
|
|
290 | (1) |
|
11.6 Training Users to Prevent Cyber Breaches |
|
|
291 | (1) |
|
11.7 User Communities and Current Training Methods |
|
|
292 | (3) |
|
11.8 Types of Training Offered and Training Environment |
|
|
295 | (2) |
|
11.9 Innovative Approaches |
|
|
297 | (2) |
|
|
299 | (2) |
|
|
299 | (2) |
|
12 Plan X and Generation Z |
|
|
301 | (22) |
|
12.1 Plan X: Foundational Cyberwarfare |
|
|
302 | (4) |
|
12.2 Cyber Battlespace Research and Development |
|
|
306 | (2) |
|
12.3 National Centers of Academic Excellence in Cyber Operations |
|
|
308 | (1) |
|
12.4 Generation Z, Teen Hackers, and Girl Coders |
|
|
309 | (4) |
|
12.5 DEF CON Diversity Panel and IT Girls 2.0 |
|
|
313 | (1) |
|
|
12.6 Control the Code, Control the World |
|
|
314 | (9) |
|
|
316 | (7) |
|
Part V Cybersecurity: Applications and Challenges |
|
|
|
13 Artificial Intelligence and Data Mining |
|
|
323 | (20) |
|
13.1 Artificial Intelligence: From Hollywood to the Real World |
|
|
323 | (2) |
|
13.2 Intelligent CCTV Cameras |
|
|
325 | (1) |
|
13.3 Data Mining in the Age of Big Data |
|
|
326 | (1) |
|
13.4 Knowledge Representation, Acquisition, and Inference |
|
|
327 | (2) |
|
13.5 Dynamic Mental Models |
|
|
329 | (1) |
|
13.6 Modeling Human Problem Solving |
|
|
330 | (1) |
|
13.7 Structural Topology and Behavioral Causality |
|
|
331 | (1) |
|
13.8 Component Clustering and Decoupling |
|
|
331 | (1) |
|
13.9 Analytical Models and Experiential Knowledge |
|
|
332 | (1) |
|
|
332 | (4) |
|
13.11 AI Applications in Counterterrorism |
|
|
336 | (1) |
|
13.12 Massively Multi-Participant Intelligence Amplification (MMPIA) |
|
|
337 | (6) |
|
|
338 | (5) |
|
14 Gamification of Penetration Testing |
|
|
343 | (6) |
|
|
14.1 Win, Lose, or Something Else |
|
|
343 | (1) |
|
14.2 Short and Long Engagements |
|
|
344 | (1) |
|
|
344 | (2) |
|
14.4 The Future: Continuous Penetration Testing |
|
|
346 | (3) |
|
|
347 | (2) |
|
15 USB Write Blocking and Forensics |
|
|
349 | (80) |
|
|
|
349 | (1) |
|
|
349 | (1) |
|
|
350 | (1) |
|
|
350 | (5) |
|
15.5 Summary of USB Basics |
|
|
355 | (1) |
|
15.6 USB Mass Storage Basics |
|
|
355 | (5) |
|
15.7 Making Forensics Images and Duplicates |
|
|
360 | (10) |
|
|
370 | (36) |
|
|
406 | (13) |
|
15.10 Leveraging Open Source |
|
|
419 | (8) |
|
|
427 | (2) |
|
16 DARPA's Cyber Grand Challenge (2014--2016) |
|
|
429 | (28) |
|
16.1 Cyber Grand Challenge Kick-off |
|
|
429 | (6) |
|
16.2 Costly Software Bugs |
|
|
435 | (2) |
|
16.3 Disastrous Arithmetic Errors |
|
|
437 | (1) |
|
16.4 DEF CON Capture the Flag |
|
|
438 | (1) |
|
16.5 DESCARTES (Distributed Expert Systems for Cyber Analysis, Reasoning, Testing, Evaluation, and Security) |
|
|
438 | (10) |
|
|
448 | (5) |
|
16.7 DESCARTES Automation Strategy |
|
|
453 | (1) |
|
16.8 The DESCARTES Chronicle |
|
|
454 | (3) |
|
|
455 | (2) |
Index |
|
457 | |