- Abbate, Janet 43
- ABC see Atanasoff–Berry Computer
- Abkhazia 64
- Accenture 37
- Advanced Persistent Threat (APT) 21, 63, 65–6, 81, 89
- Advanced Research Projects Agency (ARPA) 11, 12, 18, 42
- Afghanistan 92, 134
- African Union (AU) 88
- Agence Nationale de Sécurité des Systèmes d’Information (ANSSI) 85
- AI see Artificial Intelligence
- Aiplex Software 115
- Airbnb 69
- Al-Qaeda 119, 120, 134
- Alibaba 15
- Amazon.com 15, 47, 53
- Android 59, 125
- Anonymous 114–15
- ANSSI see Agence Nationale de Sécurité des Systèmes d’Information
- anti-virus programs 63–4, 127
- Apollo missions 25
- Apple 149–50
- Apple II 10
- APT see Advanced Persistent Threat
- Arab Spring 139, 143–4
- ARCYBER see US Army Cyber Command
- Armenia 29, 30
- ARPA see Advanced Research Projects Agency
- ARPANET 11, 13, 14, 17, 25, 32, 34, 41–2, 43, 44
- Arquilla, John 93, 94, 101
- Artificial Intelligence (AI) 25, 79, 129, 153, 155–6
- ASEAN see Association of Southeast Asian Nations
- Ashley Madison breach 37
- ASL19 39
- Association of Southeast Asian Nations (ASEAN) 88–9
- AT&T 17, 19
- Atanasoff, John Vincent 7
- Atanasoff–Berry Computer (ABC) 7–8
- Atlantic Council, Washington DC 152–3
- AU see African Union
- Aurora Generator test 19–20
- Australia 142
- Auto-ISAC (automotive sector) 129
- Aviation-ISAC 129
- Babbage, Charles 7
- Bahrain 146
- Baran, Paul 32
- Barlow, John Perry 47
- BBC 19
- BBN Technologies 44
- Belarus 96
- Belgium 21
- Bell Laboratories 8
- Berkeley, University of 156–7
- Berry, Clifford 7
- BGP see Border Gateway Protocol
- big data 155–6
- bitcoin 107, 110, 119
- Black Mirror (TV series, 2011 onwards) 157
- BlackEnergy 99
- Blair, Tony 118
- Border Gateway Protocol (BGP) 47, 64
- botnets 51, 110, 114, 130, 154
- bots 38, 71, 120
- Brantly, Aaron F. 146–7
- Brazil 50
- British Phonographic Industry 115
- British Telecom 19
- Buckshot Yankee 68
- Budapest Convention see Convention on Cybercrime (2001)
- bugs 37–8, 62, 127
- C2 see command and control
- CA see Certificate Authority
- Canada 21, 64, 142
- Captain Zap 19
- Cavelty, Myriam Dunn 98
- CCD COE see Cooperative Cyber Defense Center of Excellence
- CENTCOM see US Central Command
- Center for Long-Term Cybersecurity, University of Berkeley 156–7
- Center for Strategic and International Studies (CSIS) 20–1
- Centers for Disease Control and Prevention 20
- Central Asia 106
- Central Intelligence Agency (CIA) 57, 134
- Central Processing Unit (CPU) 29, 124, 126
- Cerf, Vinton 11, 44
- CERN see European Council for Nuclear Research
- CERT see Computer Emergency Response Team
- Certificate Authority (CA) 52
- Ceruzzi, Paul E. 13
- Charlie Hebdo 115
- China 51, 76, 79–82, 87, 89, 100, 120, 121, 135–6, 145
- Chinese General Staff Department 418th Research Institute 82
- Chrome 46
- Church of Scientology 114
- CIA see Central Intelligence Agency
- Citizen Lab (University of Toronto) 118, 147
- Clarke, Richard 94
- Clausewitz, Carl von 97
- Clinton, Bill 45, 86, 148
- Clinton, Hillary 49, 84, 145
- CNN 20
- Codenomicon 36
- Cold War 78
- Colossus 8
- command and control (C2) 70, 71, 102, 117
- Commandement de cyberdéfense (France) 101–2
- Computer Emergency Response Team (CERT) 18
- Computer Misuse Act (UK, 1988) 19
- computers
- convergence between computing / networked communication 10–11, 13–14
- development/access 6–7
- history of 7–10
- and mobile computing 25
- spread of personal computers 13–14
- Computing–Tabulating Recording Company 43
- Confidentiality, Integrity and Availability (CIA) 123
- Convention on Cybercrime (2001) (Budapest Convention) 54, 121
- Cooperative Cyber Defense Centre of Excellence (CCD COE) 54–5
- CPU see Central Processing Unit
- Craigslist 15
- Crocker, Steve 41–2
- Cross-site scripting (XSS) 114, 115, 116, 117
- Cruise, Tom 114
- cryptocurrencies 107, 110, 112, 119
- CryptoLocker 71, 72
- CSIS see Center for Strategic and International Studies
- Cuba 58
- Cyber Caliphate 118, 119
- cyber capabilities
- arsenal of possibilities 59–63
- core areas 57–8
- criminal 64–5
- definition 57
- developing 63–4, 146
- effects/characteristics 71–4
- historical strategy examples/analogies 58–9
- offensive/defensive actions 62–3
- state 65–71
- vs. kinetic capabilities 73
- as a weapon 74
- cyber conflict 98–100
- Cyber Kill Chain 66, 67–71
- “cyber Pearl Harbor” 95
- cyber power 77–9
- holistic approach 82–6
- imbalance in 147
- information control 79–82
- pro-active 86–9
- Cyber Statecraft Initiative (Atlantic Council) 152–3
- cyber technologies 143–6
- cyber theft 108–11
- cyber violence 111–12
- cyber war 71
- approach of 93–5
- and cyber conflict 98–100
- debates/arguments concerning 91, 103
- lethality of attacks 95–6
- military operations 101–3
- as taking place / not taking place 95–8
- war in the fifth domain 91–2
- Cyber War (Clarke and Knake) 94
- cyberattacks 3, 16, 39
- as acts of war 97–8
- anonymous nature of 99
- attributes 57–8
- challenges to deterrence 133–4
- and China 80–1
- Cyber Kill Chain 66, 67–71
- defensive measures/solutions 126–33, 137
- fake anti-virus programs 63–4
- growing concerns over 20
- growth of 94–5
- indirect effects 72
- lethality of 95–6
- leveraging 101
- military implications 17–18
- moderate views on 98–9
- NATO countermeasures 54–5
- non-state actors 106–22
- origins of 20–2, 36–7
- potential motives 99
- psychological effects 137
- retaliatory responses 134–5
- and Russia 64–5, 83–6, 94, 99, 100, 101
- spectrum of activities 96–7
- state-on-state 83–6, 89–90
- tactical/operational levels 102–4
- as threat to national security 92
- and the US 86–8
- see also malware; named viruses
- cyberbullying 111, 112
- cybercrime 3, 54, 63, 105–6
- bullying/stalking 111–12
- deception, fraud, extortion 107–8
- definitions of 106–7
- development of 64–5
- economic impact 113
- fraud/extortion 108
- hacktivists 114–16
- illicit marketplaces 112
- increase in 121–2
- non-state actor/s 120–2
- proliferation/impact of 106
- sexual crimes 112–13
- terrorism 105–6, 116–20
- theft 108–11
- trespassing 107
- violence 111–12
- cyberespionage 146
- Cyberpower and National Security (Kramer et al.) 78
- cybersecurity
- background 1–4
- challenges 123
- defense/deterrence 123–4
- and democracy 139–43
- encryption 148–9
- futures of 152–9
- global issue 20–2
- government/policy decisions 140–1
- government conversation on 24–5
- spyware 146
- threats/incidents 16–22
- see also national security/strategy
- cyberspace
- definition / core concepts 2, 26–8, 56
- development/proliferation into communities 3–4
- etymological roots 25
- logical-network layer 32, 34–8
- manipulation in 39
- military operations 101–3
- persona layer 38–9
- physical-network layer 27, 28–32
- science-fiction writers on 25–6
- significance 2–3
- technical value 40
- threats/opportunities 6–7
- Cyberspace Operations Center 130
- cyberstalking 111–12
- cyberterrorists 105–6, 116–20
- cybertrespassing 107
- “Cyberwar is Coming!” (Arquilla and Ronfeldt) 93
- cybotage 96–7
- CYCLADES 11
- Daily Beast 38
- DARPA see Defense Advanced Research Projects Agency
- Davies, Donald 32
- DCLeaks.com 84
- DDoS see Distributed Denial of Service
- Declaration of the Independence of Cyberspace 46–7
- Defense Advanced Research Projects Agency (DARPA) 18, 129
- Defense Information Systems Agency (DISA) 61
- defense/deterrence 123–4
- anti-virus/firewalls 127
- by denial 124–31
- by punishment 131–5
- costs/benefits 123–4
- hardware/software 124–6
- host-based measures 127–8, 129
- individual protection 126–7
- information sharing 129–31
- multiple approaches 127–8
- network measures 128–9
- organizational agreements 129–30
- painful reality 136–7
- patch management 127–8
- risks/rewards 123–4
- Deibert, Ronald 140
- Demchak, Chris 89, 102
- democracy
- civil liberties 146–7
- encryption / cyber (in)security 148–9
- imbalance of power 147
- liberation technology 143–6
- protection of information 148
- and security 139–43
- Democratic National Committee (DNC) 84, 133
- DeNardis, Laura 47, 51
- denial of service (DOS) 19, 114
- Der Spiegel 142
- deterrence see defense/deterrence
- DHCP see Dynamic Host Configuration Protocol
- Dhondup Wangchen 147
- DHS see US Department of Homeland Security
- Diamond, Larry 143, 146
- DIB-ISAC (defense industrial base) 129
- diplomacy, information, military and economic capabilities (DIME) 77
- DISA see Defense Information Systems Agency
- Distributed Denial of Service (DDoS) 31, 64, 83, 96, 110, 114, 115, 116
- DNC see Democratic National Committee
- DNS see Domain Name Service
- DoD see US Department of Defense
- Domain Name System (DNS) 34, 35, 36, 49, 69
- Dombrowski, Peter 89, 102
- DOS see denial of service
- Dubai 49
- Duke Energy 128
- Dupont, Benoit 156
- Dynamic Host Configuration Protocol (DHCP) 34
- E-ISAC (electricity sector) 129
- East Asia 106
- eBay 15
- EFF see Electronic Frontier Foundation
- Egypt 146
- Electronic Frontier Foundation (EFF) 39, 147, 148
- Electronic Numerator, Integrator, Analyzer and Computer (ENIAC) 8
- electronics 26–7
- ELIGIBLE RECEIVER 18
- ENIAC see Electronic Numerator, Integrator, Analyzer and Computer
- Estonia 54, 86, 94, 110, 115
- Ethereum 110
- EuroMaidan 139, 144
- Europe 63, 106, 142, 143
- European Agency for Network and Information Security 130
- European Council for Nuclear Research (CERN) 14
- Facebook 15, 35, 53, 80, 119, 141, 144
- Fairfax County, Virginia 107
- FALCON cable 31
- Falder, Matthew 112
- FBI see Federal Bureau of Investigation
- Federal Bureau of Investigation (FBI) 17, 69, 111, 112, 135, 149–50
- Internet Crime Complaint Center 106
- Federal Computer Fraud and Abuse Act (US, 1986) 19
- Federal Security Service (Russia) (FSB) 82, 85
- fiber-optic lines 29, 30–1
- File Transfer Protocol (FTP) 34
- FinFisher 146
- FireEye 65
- FireFox 46
- firmware 36–7
- “Five Eyes” community 142
- Flame 63
- France 21, 84–5, 88
- Freenet 39
- FS-ISAC (financial services) 129, 130
- FSB see Federal Security Service (Russia)
- FTP see File Transfer Protocol
- Gartzke, Erik 74, 100
- Gates, Bill 19
- General Data Protection Regulation (GDPR) 47–8, 143
- General Staff Main Intelligence Directorate (Russia) 65, 84
- Georgia, Republic of 29, 64, 83, 100, 110, 115
- GhostNet 147–8
- Gibson, William 13–14, 27
- GitHub 69
- Google 53
- Google Earth 119
- Google Maps 80
- governance
- challenges 41
- contentious/difficult issue 42
- Internet as complicated mess 55
- laws/norms of cyberspace 54–5
- major Internet entities 52
- and multistakeholderism 51
- origins/development 41–2
- political, social, economic 46–53
- technical 43–6
- Graphical Processing Unit (GPU) 124
- Graphical User Interface (GUI) 125
- Great Firewall of China 80, 120, 145
- Green Revolution (Iran) 49
- GRU see General Staff Main Intelligence Directorate (Russia)
- Guardian 142
- Guardian Project 148
- Guccifer 2.0 84
- GUI see Graphical User Interface
- Gvodsev, Nikolas 86
- hackers, hacking 17–19, 24, 25, 36, 37, 43, 60, 62, 64, 65, 68, 69, 70–1, 74, 108–9, 117–19
- Hacking Team 66
- hacktivists 105, 114–16, 120, 121
- Hafner, Katie 43
- “Halal” Internet (Iran) 46
- Healey, Jason 152–3
- Heartbleed bug 36
- Hess, Markus 70
- Hoffman, Bruce 117
- Hollerith, Herman 7
- Home Depot 37, 109
- Homer, Iliad 58
- Host Technical Liaisons 44
- HTML see Hypertext Markup Language
- HTTP see Hypertext Transfer Protocol
- Hussain, Junaid 118
- Hypertext Markup Language (HTML) 61
- Hypertext Transfer Protocol (HTTP) 14–15, 34
- IAB see Internet Architecture Board
- IAEA see International Atomic Energy Agency
- IANA see Internet Assigned Numbers Authority
- IBM see International Business Machines
- ICANN see Internet Corporation for Assigned Names and Numbers
- Idaho National Laboratory 19–20
- IDPSs see intrusion detection and prevention systems
- IDSs see intrusion detection systems
- IETF see Internet Engineering Task Force
- IGF see Internet Governance Forum
- IMPs see Interface Message Processors
- India 21
- Information Sharing and Analysis Centers (ISACs) 129, 130
- Information Sharing and Analysis Organizations (ISAOs) 130
- Intel chips 126
- Interface Message Processors (IMPs) 34, 42, 44
- International Atomic Energy Agency (IAEA) 68
- International Business Machines (IBM) 8, 10, 25, 43, 61
- International Covenant on Civil and Political Rights (1966) 141
- International Federation of the Phonographic Industry 115
- International Strategy for Cyberspace (2011) (United States) 87, 145
- International Telecommunications Regulations (ITRs) 49
- International Telecommunications Union (ITU) 48, 49, 51
- Internet 30
- cyber threats/incidents 16–22
- data on browsing habits 141–2
- governance issues 43–5, 47–53
- government interventions 145–6
- “Halal” (Iran) 46
- importance of 49
- as “liberation technology” 139
- misappropriation/misuse of IP addresses / domain names 47–8
- net neutrality 53
- as political tool 49–50
- privacy on 143
- reductions in freedom 145–6
- spread of 14–15
- technical functions 45–6
- Internet Architecture Board (IAB) 45, 52
- Internet Assigned Numbers Authority (IANA) 44, 46
- Internet Corporation for Assigned Names and Numbers (ICANN) 35, 45, 46, 48–52
- Internet Engineering Task Force (IETF) 36, 42, 45, 52
- Internet Exchange Points (IXPs) 52, 130
- Internet Explorer 15, 46
- Internet Governance Forum (IGF) 48, 49, 52
- Internet Network Operators’ Groups (NOGs) 51, 52
- Internet Protocol (IP) 11, 13, 34, 38, 44, 47, 141, 155
- Internet Research Agency, St. Petersburg (Russia) 38
- Internet Research Task Force (IRTF) 45, 52
- Internet Service Providers (ISPs) 14, 30, 35, 51, 52, 64, 80, 83, 89, 130
- Internet Society (ISOC) 45, 52, 158
- Internet of Things (IoT) 90, 153–5
- intrusion detection and prevention systems (IDPSs) 70, 128
- intrusion detection systems (IDSs) 128–9
- intrusion prevention systems (IPS) 128, 129
- iOS 59, 125
- IoT see Internet of Things
- IP see Internet Protocol
- iPhones 25
- IPS see intrusion prevention systems
- IPv4 Address 36
- Iran 51, 68, 69, 89, 96–7
- Iraq 68, 92, 117
- IRTF see Internet Research Task Force
- ISACs see Information Sharing and Analysis Centers
- ISAOs see Information Sharing and Analysis Organizations
- Islamic State in Iraq and Syria (ISIS) 115, 117, 118, 119
- ISOC see Internet Society
- ISPs see Internet Service Providers
- Israel 21
- ITRs see International Telecommunications Regulations
- ITU see International Telecommunications Union
- IXPs see Internet Exchange Points
- Japan 21, 58
- Jensen, Benjamin 81, 88
- Jiang Zemin 79
- Jobs, Steve 10
- Joint Task Force (JTF) Ares 120
- Kahn, Robert 44
- Kello, Lucas 74
- Kennedy, John F. 58
- KGB see Soviet Committee for State Security
- Khan, Robert 11
- King, Gary 80
- Klimburg, Alex 115
- KLOC 62
- Knake, Robert 94
- Kramer, Franklin 78
- Kuehl, Daniel 26–8, 77
- Lashkar-e-Taiba (LeT) 119
- Lawrence Berkeley National Laboratory 17, 70
- Laws of War 55
- Leiner, Barry 13
- LeT see Lashkar-e-Taiba
- Liang Qiao 79, 135
- liberation technology 143–6
- Lin, Herbert 72
- Lindsay, Jon 74, 133
- LinkedIn 15
- Linux 59, 69, 125
- Live Free or Die Hard (film, 2007) 111
- Lizard Squad 118
- Lockheed Martin 66
- Lodz, Poland 111
- LOIC see Low Orbit Ion Cannon
- Lorenz cipher 8
- Love Bug (“ILOVEYOU”) 20
- Low Orbit Ion Cannon (LOIC) 114
- LTE technology 30
- Lyon, Mark 43
- Mac OS 59, 69, 125
- McAfee 106
- McArthur, General Douglas 58
- McGraw, Gary 94
- Macron, Emmanuel 85
- malware (malicious software) 3, 17–18, 20, 37
- complexity/sophistication of 61–2
- cyber extortion 107–8
- Cyber Kill Chain model 66–71
- development of 64, 65, 66
- diffusion of 66
- lifespan 63
- polymorphic sample 61
- production/distribution of 66
- malware (malicious software) features
- Entry Point Obfuscator (EPO) 60
- metamorphic 60
- multi-part 60
- multi-partite 60
- polymorphic 60
- resident 60
- stealth 60
- malware (malicious software) types 59
- Mandiant reports 21, 65–6, 136
- Maness, Ryan C. 81, 88, 97, 98, 100
- Manning, Chelsea 115
- Mao Tse Tung (Mao Zedong) 82
- Mark I project 11
- Massachusetts Institute of Technology (MIT) 43
- Matusiewicz family 111
- Mayhem 129
- Media Access Control (MAC) address 38
- Meltdown 126
- Metasplit 65
- Microsoft 19, 37, 62, 68, 127
- MILNET 14, 17, 25
- Minitel 46
- Mirai DDoS 69
- MIT see Massachusetts Institute of Technology
- Mitnick, Kevin 69
- MITRE Corporation 17
- MLAT see multilateral legal assistance
- Model Railroad Club 43
- Moore, Daniel 149
- Morris worm 17–18
- Mosaic 15
- Motion Picture Association of America (MPAA) 115
- multilateral legal assistance (MLAT) 121
- Mumbai, India 119
- MVD see Russian Ministry of Internal Affairs
- Nakasone, Paul 88
- Napster 146
- NASA see National Aeronautics and Space Administration
- Natanz nuclear facility (Iran) 69, 96–7
- National Aeronautics and Space Administration (NASA) 18
- National Center for Missing and Exploited Children (NCMEC) 112
- National Cybersecurity and Communications Integration Center (NCCIC) 87
- National Cybersecurity Strategy 88
- National Democratic Institute 39
- National Health Service (NHS) 62
- National Physical Laboratory (NPL) 11, 32
- National Science Foundation (NSF) 42, 44
- national security/strategy
- China example (controlling information) 79–82
- common lenses/challenges 89–90
- as complex endeavor 76
- government investment 140–1
- maintaining 77–9
- need for 76
- non-state actors 120–2
- objective/subjective understanding of 77
- Russia’s holistic approach 82–6
- US as pro-active cyber power 86–9
- see also cybersecurity
- National Security Decision Directive (NSDD) 24
- National Telecommunications and Information Administration (NTIA) 45, 48
- NATO see North Atlantic Treaty Organization
- Naval Research Laboratories 39
- NCCIC see National Cybersecurity and Communications Integration Center
- NCMEC see National Center for Missing and Exploited Children
- Netflix 69
- Netherlands 85
- NetMundial 50
- Netscape 15
- Network Measurement Group 44
- Network Solutions Inc. (NSI) 44–5
- networked communication 10–11, 13–14
- New York Times 18–19, 20
- New Yorker 38
- New Zealand 142
- NGOs see non-governmental organizations
- NHS see National Health Service
- Nigerian Prince email scam 107
- Nimitz, Admiral Chester 58
- NIPRnet see Non-Classified Internet Protocol Router Network
- NIST see US National Institute of Standards and Technology
- nodes 28–9
- NOGs see Internet Network Operators’ Groups
- Non-Classified Internet Protocol Router Network (NIPRnet) 126
- non-governmental organizations (NGOs) 44, 46, 49, 53, 147
- NORSAR 14
- North Atlantic Treaty Organization (NATO) 3, 54, 55, 86, 92, 94, 130
- North Korea 62, 72, 134
- Norton, Vice Admiral Nancy A. 61
- NPL see National Physical Laboratory
- NSA see US National Security Agency
- NSF see National Science Foundation; US National Science Foundation
- NSFNET 14, 25
- NSI see Network Solutions Inc.
- NTIA see National Telecommunications and Information Administration
- Nye, Joseph 77
- Obama, Barack 118, 136
- Oliver, John 53
- “Olympic Games” 97
- The Onion Router (Tor) 39, 65, 87, 112, 145
- Open Systems Interconnection Model (OSI Model) 35
- Open Technology Institute 39
- OpenSSL 36
- Operation Avenge Assange 115
- Operation Orchard 94
- Operation Payback 115
- OPISIS 115
- Orbot 39
- Orwell, George, Nineteen Eighty-Four 142
- OSI Model see Open Systems Interconnection Model
- Pacific 106
- packet switching 32–4
- Pakistan 146
- Panetta, Leon 95
- Paris 119
- Patch Tuesday 127–8
- Paths to Our Digital Future (ISOC report) 158
- Pentagon 17
- People’s Liberation Army (PLA) 65, 82, 102, 135
- personally identifiable information (PII) 66, 109
- Pirate Bay, The 115, 146
- PLA see People’s Liberation Army
- Postel, Jon 44
- PPD see US Presidential Policy Directive 20
- PRISM 142
- Psiphon 39
- Putin, Vladimir 84
- RAND Corporation 32, 93
- ransomware 63, 107–8
- Raymond, Mark 51
- RBN see Russian Business Network
- Reagan, Ronald 17, 24
- Recording Industry Association of America (RIAA) 115
- Reddit 69
- Regional Internet Registries (RIRs) 52
- Renren Network 15
- Reporters Without Borders 39, 147
- Request for Comment (RFC) 41–2, 43, 44, 45
- RIAA see Recording Industry Association of America
- Rid, Thomas 74, 95–7, 149
- RIRs see Regional Internet Registries
- Rohozinski, Rafal 140
- Ronfeldt, David 93, 101
- router 29, 30
- RUNET 83, 85
- Russia 51, 63, 65, 76, 79, 82–6, 87, 89, 94, 99, 100, 120–1, 133, 145
- Russian Business Network (RBN) 64–8, 71, 86
- Russian Foreign Intelligence Service (SVR) 65, 85
- Russian Ministry of Internal Affairs (MVD) 85
- Russo-Georgian war (2008) 101
- Safari 46
- Samson, Peter 43
- San Bernardino 149, 150
- San Francisco Municipal Transportation Agency 108
- SCADA systems 19
- Schmitt, Michael 92
- SDL see security development lifecycle
- Second Life 39
- Second World War 6, 8, 10, 25, 58, 94, 155
- security development lifecycle (SDL) 125
- server 27, 29, 30, 35, 48, 70, 94, 109, 114, 147-8
- Shadow Brokers 62, 73
- Sheldon, John 77, 98
- signals intelligence (SIGINT) 82, 85
- Silk Road 112
- Simple Mail Transfer Protocol (SMTP) 34
- Singapore 130, 142
- SMTP see Simple Mail Transfer Protocol
- Snowden, Edward 50, 142
- social media 15, 35, 47, 49, 53, 69, 80, 115, 118, 119, 141, 143, 144
- software 36–7
- SOLAR SUNRISE 18
- South Africa 21
- South Korea 88
- South Ossetia 64
- Soviet Committee for State Security (KGB) 17, 70, 71, 82
- Soviet Union 58, 82
- spade-hacker 29, 30
- Special Forces 134
- Spectre 126
- spyware 59, 118, 146
- SQL injection 114, 115, 116, 117
- Stanford University 11
- Starr, Stuart 78
- Steiner, Peter 38
- Stoll, Clifford 17, 70–1
- Stone, John 97
- Storybox 84, 98, 101
- Stuxnet 96–7, 99
- Sun Zhigang 143
- Sutton, Will 105
- SVR see Russian Foreign Intelligence Service
- Syria 92, 94, 117
- System for Operative Investigative Activities (Soviet Union) 82
- Tactical Technology Collective 39
- Tails Boum 39
- Taiwan 21
- Taliban 134
- Tallinn 55, 94
- Target Corporation 37, 108–9
- TCP see Transmission Control Protocol
- teaMpOison 118
- Tech of the Islamic State 110
- Telcos 51
- Tenenbaum, Ehud 18
- terrorism 105–6, 116–20
- Time magazine 135
- Titan Rain 81, 135
- TLDs see Top-Level Domains
- TLS/SSL see Transit Layer Security / Secure Socket Layer
- Tomlinson, Ray 13
- Top-Level Domains (TLDs) 47, 49
- Toronto, University of 118, 147
- Transit Layer Security / Secure Socket Layer (TLS/SSL) 34
- Transmission Control Protocol (TCP) 11, 13, 34, 44
- Trump, Donald 53, 88
- Twitter 15, 49, 53, 69, 115, 118, 119, 143, 144
- UCL see University College London
- Uganda 146
- UK Joint Forces Cyber Group 101
- UK National Cyber Security Centre 88
- Ukraine 63, 69, 83, 98, 99, 144
- Ulbricht, William (“Dread Pirate Roberts”) 112
- UN GGE see United Nations Governmental Group of Experts
- Uniform Resource Locator (URL) 15, 47
- Unit 61938 65–6, 68, 70, 71, 82, 136
- United Arab Emirates 21
- United Kingdom 6, 8, 19, 21, 32, 62, 85, 88, 101, 142, 146
- United Nations 48, 89
- United Nations Governmental Group of Experts (UN GGE) 54
- United States 6, 8, 21, 63, 85, 86–9, 100, 142
- Universal Declaration of Human Rights (1948) 141
- University of California–Los Angeles 11
- University College London (UCL) 14
- Unrestricted Warfare (Liang Qiao and Wang Xiansui) 79, 135
- URL see Uniform Resource Locator
- US Army 126
- Cyber Command (ARCYBER) 120
- US Army Counterintelligence 135
- US Central Command (CENTCOM) 118
- US Cyber Command (USCYBERCOM) 16, 87–8, 101
- US Department of Commerce 45
- US Department of Defense (DoD) 2, 6, 9, 11, 13, 18, 26, 35, 44, 61, 135
- Joint Publication 3-12 27
- US Department of Homeland Security (DHS) 87
- US Department of Justice 87, 136
- US Library of Congress 66
- US National Defense University 26
- US National Institute of Standards and Technology (NIST) 37, 127
- US National Science Foundation (NSF) 14
- US National Security Agency (NSA) 17, 18, 50, 73, 142
- US “National Strategy on Global Supply Chain Management” (2012) 125
- US “National Strategy to Secure Cyberspace” (2003) 20
- US Presidential Policy Directive 20 (PPD-20) 88
- US Senate 20
- USCYBERCOM see US Cyber Command
- User Datagram Protocol (UDP) 34
- Valeriano, Brandon 81, 88, 97, 98, 99–100
- Virtual Private Networks (VPN) 65
- VirusBlokAda 96
- viruses 19
- VKontakte 15, 83
- VPN see Virtual Private Networks
- W3C see World Wide Web Consortium
- Wang Xiansui 79, 135
- WannaCry 62, 108
- WarGames at Camp David (film, 1983) 24, 107
- Warner, Michael 16, 18
- Washington Post 142
- Web 2.0 15
- websites 35
- Wentz, Larry 78
- Westworld (TV series, 2016 onwards) 157
- Wi-Fi 15, 30
- Wiener, Norbert, Cybernetics: Or, Control and Communication in the Animal and the Machine 25
- Wikileaks 115
- Willis, Bruce 111
- Windows 59, 63, 125, 128
- Windows Defender 127
- Working Group on Internet Governance 48
- World Summit on the Information Society (WSIS) (2003–5) 41, 48
- World of Warcraft 39
- World Wide Web (WWW) 14–16, 19, 46, 139–40
- World Wide Web Consortium (W3C) 46, 52
- Wozniak, Steve 10
- WSIS see World Summit on the Information Society
- WWW see World Wide Web
- Xi Jinping 136
- XKeyscore 142
- XSS see Cross-site scripting