Counterterrorism and Cybersecurity



Similar documents
Espionage and Intelligence. Debra A. Miller, Book Editor

The main object of my research is :

NSA Surveillance, National Security and Privacy

The Senior Executive s Role in Cybersecurity. By: Andrew Serwin and Ron Plesco.

Confrontation or Collaboration?

CITIZEN ADVOCACY CENTER

Defending Against Data Beaches: Internal Controls for Cybersecurity

Research Note Engaging in Cyber Warfare

Offensive capabilities

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

WRITTEN TESTIMONY OF

Key Concepts Chart (The United States after the Cold War)

the Council of Councils initiative

Image credits: Front cover: U.S. Army photo by Sgt. Brandon Little, Task Force XII PAO, MND-B Inside back cover: U.S Army photo by Staff Sgt.

What is Really Needed to Secure the Internet of Things?

It's a MAD, MAD, MAD Cyber World

Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies

Security Threats on National Defense ICT based on IoT

US Intelligence Community Thomas Patrick Carroll 1

Name. September 11, 2001: A Turning Point

Microsoft s cybersecurity commitment

Cyberterror. Cyberspace computer-mediated communication systems has become a battleground between states and terrorists, and among nation states.

UTCS CyberSecurity. Educating Cyber Professionals. Dr. Bill Young Department of Computer Sciences University of Texas at Austin. Spring Semester, 2015

National Cybersecurity & Communications Integration Center (NCCIC)

How To Get A Law Passed In The United States

THE HUMAN FACTOR AT THE CORE OF FEDERAL CYBERSECURITY

FBI CHALLENGES IN A CYBER-BASED WORLD

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

The Strategic Importance, Causes and Consequences of Terrorism

AN INSIGHT TO CYBER WORLD WITH PROF. MICHAEL E.SMITH

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

The EU s approach to Cyber Security and Defence

Cybercrime in Canadian Criminal Law

Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives

The Comprehensive National Cybersecurity Initiative

I N T E L L I G E N C E A S S E S S M E N T

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

Corporate Spying An Overview

Cybersecurity. Are you prepared?

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Into the cybersecurity breach

working group on foreign policy and grand strategy

POTOMAC INSTITUTE FOR POLICY STUDIES. Revolution in Intelligence Affairs: Transforming Intelligence for Emerging Challenges

Internet Safety and Security: Strategies for Building an Internet Safety Wall

CHAPTER 10: COMPUTER SECURITY AND RISKS

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

Earn a Bachelor or Master of Science Degree (BS/MS) in Intelligence Management at Henley-Putnam, a Leader in Intelligence Studies Education

Anthony Minnaar Dept of Criminology & Security Science School of Criminal Justice College of Law University of South Africa

Top 5 Data Breaches in 2014

POLICIES TO MITIGATE CYBER RISK

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

VIENNA MODEL UNITED NATIONS CLUB

Introduction to Networks and Business Intelligence

Roles and Responsibilities of Cyber Intelligence for Cyber Operations in Cyberspace

Incident Response 101: You ve been hacked, now what?

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Cyber Security Management

A Critique of President Obama s Reforms of U.S. Intelligence


How To Protect Your Privacy From Data Mining And Aggregation

Public Opinion on Selected National Security Issues:

Today s Cybersecurity Technology: Is Your Business Getting Full Protection?

Cybersecurity Vulnerability Management:

Cyber Adversary Characterization. Know thy enemy!

WILLIAM C. SNYDER Syracuse University College of Law E. I. White Hall, Room 268 Syracuse, NY

Dear Delegates, It is a pleasure to welcome you to the 2014 Montessori Model United Nations Conference.

STATEMENT OF JOSEPH M. DEMAREST, JR. ASSISTANT DIRECTOR CYBER DIVISION FEDERAL BUREAU OF INVESTIGATION

SPEECH. Visit for more news and information about MINDEF and the SAF

Cybersecurity Primer

Today s Global Cyber Security Status and Trustworthy Systems That Leverage Distrust Amongst Sovereigns

Newsweek Poll Psychology of Voter Anger Princeton Survey Research Associates International. Final Topline Results (10/1/10)

Cybersecurity: Thailand s and ASEAN s priorities. Soranun Jiwasurat

Practical Steps To Securing Process Control Networks

Create Extraordinary Online Consumer Experiences. Your Journey Begins with Nominum

Transcription:

Newton Lee Counterterrorism and Cybersecurity Total Information Awareness Spri

Part I Counterterrorism in Retrospect: Then and Now 1 September 11 Attacks 3 1.1 September 3 Disney's Responses to the Attacks 5 1.3 FBI Warning of Hollywood as a Terrorist Target 7 Hollywood Realism on Terrorism 8 1.5 of Infamy and America at War 9 1.6 September 12 2 U.S. Intelligence Community 15 FBI Ten Most Wanted Fugitive: Osama Bin Laden 15 2.2 An American Hero Bom in Lebanon 2.3 The FBI-CIA Bureaucratic Rivalries 19 2.4 Operational Failures of the U.S. Intelligence Community 20 2.5 Unity of Counterterrorism Effort Across U.S. Government 22 2.6 Transition from to and 23 2.7 Chinese Wall between the CIA and FBI 26 2.8 U.S. Fusion Centers 28 2.9 Hard Lessons from Pearl Harbor and 29 30 Part II Counterterrorism Technologies: Total Information Awareness and Data Mining 3 The Rise and Fall of Total Information Awareness. 3.1 President Ronald Reagan and Admiral John 37 3.2 Defense Advanced Research Projects Agency 38 3.3 Information Awareness Office. 39 3.4 Perception of Privacy 40

3.5 Privacy Protection in Total Information Awareness (TIA) 41 3.6 Opposing Views on TIA 43 3.7 Demystifying IAO and TIA 44 3.8 Demise TIA 46 49 The Afterlife of Total Information Awareness 51 4.1 NSA's Terrorist Surveillance Program 51 4.2 President George W. Bush and NSA Warrantless Wiretapping... 53 4.3 Poindexter's Policy Analysis Market 54 4.4 Project Argus: Bio-Surveillance Priming System 55 4.5 President Barack Obama's Big Data R&D Initiative 56 4.6 CIA's Funded Technologies 56 4.7 Microsoft and NYPD's Domain Awareness System 57 4.8 $2-Billion-Dollar Data-Mining and Spy Center 58 60 Artificial Intelligence and Data Mining 63 5.1 Artificial Intelligence: From Hollywood to the Real World 63 5.2 Intelligent CCTV Cameras 64 5.3 Data Mining in the Age of Big Data 65 5.4 Knowledge Representation, Acquisition, and Inference 67 5.5 Dynamic Mental Models 68 5.6 Modeling Human Problem Solving 69 5.7 Structural Topology and Behavioral Causality 70 5.8 Component Clustering and Decoupling 71 5.9 Analytical Models and Experiential Knowledge 71 5.10 DM 2 Algorithm 72 Applications in Counterterrorism 75 5.12 Massively Multi-Participant Intelligence Amplification 76 77 Part III Counterterrorism Technologies: Social Media and Cybersecurity 6 Social Media and Street of Total Information 83 6.1 It's a Small World, with CCTVs 83 6.2 Facebook Nation: Total Information Awareness 84 6.3 Surveillance Satellites, Tracking Devices, Spy Malware, and Drones 86 6.4 Street of Total Information Awareness 89 6.5 No Doomsday for the Internet 6.6 Web 2.0 for Intelligence Community: Intellipedia, A-Space, Deepnet 92 93

Cyber Warfare: Weapon of Mass Disruption 99 7.1 Weapon of Mass Disruption 99 7.2 Financial Disruption 100 7.3 Infrastructure Disruption 102 7.4 Government and Military Disruption 106 7.5 Counterfeit Parts and Backdoors 108 7.6 Proliferation of Cyber Weapons and Reverse Engineering 109 7.7 Escalation of Cyber Warfare 7.8 Cyber Cold War 7.9 Cyber Terrorism and Digital Pearl Harbor Cyber Attacks, Prevention, and Cybersecurity Acts 8.2 Cybersecurity Initiatives: NICE, Presidential Executive Order 120 8.3 National Cyber Security Awareness Month (NCSAM) 121 8.4 Mitigation from Denial of Service (DoS, DDoS, DRDoS) Attacks 122 8.5 Data Breach Prevention 124 8.6 Fighting Back Against Phishing and Spoofing 8.7 Password Protection and Security Questions 8.8 Software Upgrades and Security Patches 8.9 Fake Software and Free Downloads 8.10 Smartphone Security Protection 132 8.11 Cybersecurity Awareness: Everyone's Responsibility 135 Plan X and Generation Z 143 9.1 Plan X: Foundational Cyberwarfare 143 9.2 Cyber Battlespace Research and Development 9.3 National Centers of Academic Excellence in Cyber Operations... 146 9.4 Generation Z, Teen Hackers, and Girl Coders 146 9.5 Control the Code, Control the World 150 Part Counterterrorism Strategies: Causes and Cures, War and Peace 10 Understanding Terrorism Bravery and Cowardice 10.2 Drones Kill Terrorists, Not Terrorism 10.3 on Terror 160 10.4 A Stubborn Terror 161 10.5 Battle is Economic. Not Military 163

xii Contents 10.6 Inside the Terrorist Mind 164 10.7 Questioning Terrorism and Destroying Stereotypes 168 11 Cures for Terrorism 173 Terrorism as a Disease 173 11.2 "Revenge is Sour": George Orwell 175 "Govern Your Passions or They will be Your Undoing": Mr. Spock 176 "Impossible to Carry a Grudge and a Big Dream at the Same Time" 177 "Every Truth has Two Sides": Aesop 178 "Give Everyone a Voice": Mark Zuckerberg 179 "The Only Security of All is in a Free Press": Thomas Jefferson 181 "Free Speech Would Not Protect a Man Falsely Shouting Fire": Oliver Wendell Holmes, Jr. 183 11.9 of Nonviolent Sharp 185 "We Do Not Have the Right to Resort to Violence When We Don't Get Our Way": President Bill Clinton "Peace is the only path to true security": President Barack 192 192 12 and Peace 197 War as State-Sponsored Terrorism 197 12.2 Complacency in War 199 12.3 Civilians Wanting Peace 200 12.4 Peace Entailing Sacrifice 200 12.5 Peace and Friendships on Facebook and Social Media 203 12.6 Attainable Peace 205 12.7 A Just and Lasting Peace 206 208 About the Author 213 Index 215