by Shane Harris
U.S. presence of
and USS Cole
Al Shiraa
Amal
American Civil Liberties Union (ACLU)
Anschutz, Philip
antisubmarine warfare
Arafat, Yasser
ARDA (Advanced Research and Development Activity)
Armour, Tom
Army, U.S.:
and Achille Lauro
Army Field Manual
and IDC, see Information Dominance Center
Intelligence and Security Command
Intelligence Command
and intelligence gap
Land Information Warfare Activity
Signals Security Agency
Ashcroft, John
AT&T
Atta, Mohamed
Aum Shinrikyo
Bacon, Kevin
BAG (Big Ass Graph)
as ADVISE
creation of
failures of
financial data in
and graph theory
information overload in
and metadata
and Monitor
Stellar Wind as
and telecom records
Baginski, Maureen
Baltimore Gas & Electric
Basketball
Becker, Art
Beirut, Lebanon:
killings and kidnappings in
Marine barracks attacked in
see also Lebanon
Berlin Wall, fall of
Beyster, Bob
Biden, Joe
bin Laden, Osama
Black, Bill
Black, Hugo L.
Black Hawk Down (1993)
Black Panthers
Blue Dogs
Boehner, John
Bojinka
Booz Allen Hamilton:
and Clapper
and cybersecurity to financial sector
and McConnell
and TIA
Brennan, John
Brenner, Joel
Britain:
security threat in
as surveillance state
Brown v. Board of Education
Buckley, William
Buckley Air Force Base, Colorado
Bush, George H. W.
Bush, George W.
Bush administration:
and Able Danger cover-up
and Congress
and cybersecurity
and executive war powers
and FISA
influence in
intelligence politicized by
and Iraqi weapons
and leaks
and NSA
Office of Legal Counsel
and Office of National Intelligence
and privacy concerns
questions of illegality in
and terrorists
and Times story
and warrantless surveillance
and wiretapping
CALEA (Communications Assistance for Law Enforcement Act) [1994]
Cantigny conference
Card, Andrew
Carnivore
Casey, William J.
Center for Democracy and Technology
Center for National Security Studies
Center for Strategic and International Studies
Cheney, Dick:
as defense secretary
and information warfare
and McConnell
and TIA/NSA
as vice president
Cherry Vanilla World
Chertoff, Michael:
and airport security procedures
and British security threat
and Cantigny conference
and Homeland Security
private counseling firm of
China:
hackers in
missile sales to
spy network of
ChoicePoint
CIA (Central Intelligence Agency):
and Al Qaeda
analytic shortcomings of
and bin Laden
and British terrorist threat
changing after 9/11
communications hotline
counterterrorist center
emergency measures in
and foreign espionage
and interagency rivalry
invalid data from
and Iran-Contra
and Karic
laws governing deployment of
leaks from
nonproliferation center
prisons and interrogations run by
as risk averse
terrorism as low priority for
and terrorist funding
and TIA
U.S. persons targeted by
Clancy, Tom, Clear and Present Danger
Clapper, James
Clark, Bill
Clarke, Richard
Clinton, Hillary Rodham
Clinton administration
and Balkans
and FISA warrants
and privacy laws
and wiretapping
Clipper chip
Coast Guard, U.S.
Cohen, William S.
Comey, James
Commodore
Comprehensive National Cybersecurity Initiative
Congress, U.S.:
and Able Danger
antiterrorism laws in
Blue Dogs in
and Bush administration
and electronic surveillance
and FISA
and Gang of Eight
and Iran-Contra
and NSA
overlapping executive powers
Congress, U.S.:
political enemies in
and privacy of U.S. persons
Protect America Act
and terrorist detention
and TIA
USA PATRIOT Act
Counterterrorism Security Group (CSG)
“Counterterrorism Technology and Privacy” (McCormick discussion)
Craxi, Bettino
Crisis Management Center
Crisis Pre-Planning Group (CPPG)
Cruise, Tom
Customs Bureau, U.S.
DARPA (Defense Advanced Research Projects Agency):
Evidence Extraction and Link Discovery
and Genoa
Information Awareness Office (IAO)
Information Systems Office
and Spinnaker
and TIA
Defense Department:
and Able Danger
and black budget
and information warfare
intelligence budget controlled by
and interagency rivalry
and privacy law
and situational awareness
Systems Analysis Division
and TIA
see also Pentagon, U.S.
Defense Intelligence Agency (DIA)
Delta Airlines
Dempsey, Jim
Dennis, Steve
Director of National Intelligence (DNI)
Disruptive Technology Office
Dolphin, Glenn
Downing Assessment Task Force
Eagle
Economist
Edwards, Don
Edwards, John
Egypt, and Achille Lauro
Electronic Communications Privacy Act (ECPA) [1986]
Emanuel, Rahm
encryption technology
Enemy of the State (film)
EPIC (Electronic Privacy Information Center)
Executive order 12333 (twelve triple three)
FAA (Federal Aviation Administration)
FBI (Federal Bureau of Investigation):
bureaucracy of
and ChoicePoint
data not shared by
and domestic spying
emergency measures in
false accusations by
Financial Review Group
and FISA
and Karic
and NSA
>
terrorism as low priority for
and terrorist interrogation
and terrorist threat
and TIA
wild-goose chases of
and wiretapping
FCC (Federal Communications Commission)
Feinstein, Dianne
Financial Crimes Enforcement Network (FinCEN)
First Data, Colorado
FISA (Foreign Intelligence Surveillance Act) [1978]
changing language in
and Congress
and emergency surveillance
and Executive order 12333
and foreign/domestic wall
and immunity from civil suits
McConnell’s attempts to update
passage of
and Protect America Act
and September 11 attacks
sunset clause in
and warrantless surveillance
warrants under
and wiretapping
FISA Amendments Act
Fitzgerald, F. Scott
Flint, Lara
Foreign Affairs magazine
Foreign Intelligence Court of Review
Fourth Amendment
Freedom of Information Act
Freeh, Louis J.
FutureMAP (Futures Markets Applied to Prediction)
Gang of Eight
Gates, Robert
“Geneva,”
Genoa:
and Aum Shinrikyo
building support for
bureaucratic reluctance to use
purposes of
Spinnaker as
Genoa II
Gentry, Tony
Ghorbanifar, Manucher
Gibbons, James
Gidari, Al
Giuliani, Rudy
Goldman Sachs
Goldsmith, Jack
Gonzales, Alberto:
as attorney general
and Congress
and executive powers
and global telecommunications
and illegal domestic spying
and immunity from civil suits
as president’s lawyer
and U.S. soldiers in Iraq
and warrantless surveillance
Goss, Porter
GRiD Compass (computer)
Groundbreaker
Guantánamo Bay, Cuba
Gulf War (1991)
Hadley, Stephen
Hall, Wilma
Hamilton, Lee
Hamre, John:
and Cantigny conference
and Center for Strategic and International Studies
and Chinese spy network
and data-mining tools
and IDC
and TIA
Harman, Jane
Harper, Jim
Hart, Gary
Hasenfus, Eugene
hawala (money moving)
Hawley, Kip
Hayden, Michael:
Air Force career
and BAG
as CIA director
and defense of government secrets
and early-warning system for terrorism
and FISA
Hayden, Michael:
and foreign/domestic intelligence wall
and National Intelligence Office
and NSA
on prisoner interrogation
and public relations
and Qwest
and September 11 attacks
and technology upgrades
and TIA
and Times
and warrantless surveillance
Heath, James
Heritage Foundation
Hezbollah
Hicks & Associates
Highlands Forum, Carmel Valley, California
Holloway, James
Homeland Security, Department of:
and ADVISE
and Allen
and British terrorist threat
and Chertoff
and cyberdefense
and data-mining projects
Data Privacy and Integrity Advisory Committee
information sources of
mission areas of
Hoover, J. Edgar
Human Identification at a Distance
Hurricane Katrina
Hussein, Saddam
IBM
Immigration and Naturalization Service (INS)
Information Awareness Office (IAO):
and DARPA
logo for
media attacks on
mission of
and privacy study
and TIA
Information Dominance Center (IDC)
and Able Danger, see Able Danger
and Al Qaeda
and Army Intelligence Command
and China
and Karic
and link charts
and privacy law
renewal of clearance
and TIA
and U.S. Central Command
and USS Cole
Information Systems Office
Inouye, Daniel
Institute for Defense Analysis
intelligence:
black budget for
budget cutbacks in
central control of
covert forces in the field
dark arts of
and Executive order 12333
failures of
FISA
flow between governments
foreign/domestic wall of
and Gang of Eight
information overload in
information retrieval in
and information warfare
and interagency cooperation
and interagency rivalry
master database for
metadata in
and minimization
and mission creep
misuse of
from open sources
outdated tradecraft of
politicization of
private industry mining of
recommended actions
restrictions on gathering, storage, and use of
signals
systemic overcollection of
and technology
on U.S. persons
warrantless surveillance
watching the watchers
Intelligence and Security Command
Internet:
and cybersecurity
e-mail records
financial news on
first
free space of
hackers on
intelligence drawn from
junk spam/noise of
link charts from
open sources on
and privacy
propaganda spread via
protection from government control
and Qwest
IOWA center
Iran:
and Iraq
Ministry of Information and Security
regime change in
and Russian mobsters
U.S. arms embargo
U.S. hostages in
Iran-Contra affair
and CIA
commission report on
and Congress
and Israel
and North
and Poindexter
and Reagan
and trial
and UNODIR
and U.S. hostages
Iraq:
British policy in
information warfare in
insurgents in
intelligence gap in
and Iran
Kuwait invaded by
opponents of war in
rules of engagement in
rumors of weapons in
Saffron in
U.S. invasion of
U.S. technology in
IRS (Internal Revenue Service)
Israel:
and Achille Lauro
and Iran-Contra
and missile sales
Palestine vs.
U.S. policies about
Israeli Defense Force (IDF)
Italy, and Achille Lauro
Jackson, Michael (Homeland Security)
Japan, Aum Shinrikyo attacks in
JCAG (Joint Counterintelligence Assessment Group)
Johns Hopkins, Applied Physics Laboratory
Johnson, David
Joint Worldwide Intelligence Communications System
Jonas, Jeff
background of
and data privacy
and debtor matching
and Highlands Forum
and IBM
and Las Vegas casinos
and NORA
JSOC (Joint Special Operations Command), and Achille Lauro
Justice Department:
and ChoicePoint
and intercepted e-mails
and legality of procedures
and warrantless surveillance
and wiretapping
Karic, Dragomir
Keller, Bill
Kennedy, Joseph P.
Kenya, U.S. embassy attacked in
Kerr, Donald
Khobar Towers, Saudi Arabia, bombing of
Khomeini, Ayatollah Ruhollah
Kissinger, Henry A.
Kleinsmith, Erik:
and Able Danger
and China
data deleted by
influence of
as intelligence analysis instructor
and Karic
and Lockheed Martin
and privacy law
and September 11 attacks
and Special Operations
Klinghoffer, Leon
“Knowledge is power,”
Krongard, A. B. “Buzzy,”
Kuwait, Iraqi invasion of
Lake, Tony
Lambert, Geoffrey
Land Information Warfare Activity
Las Vegas, casinos in
Lawrence Livermore National Laboratory:
and ADVISE
IOWA center in
and Monitor
on technology and national security
Leahy, Patrick J.
Lebanon:
British policy in
civil war in
Sheikh Abdullah barracks in
Syrian occupation of
terrorist signals ignored in
U.S. embassy bombed in
U.S. government reaction to suicide bombing in
U.S. hostages in
U.S. Marines attacked in
Lehman, John
Leopold, Reuven
Libya, and Palestinian terrorists
Lockheed Martin
logic layer
Lohr, Michael
Lukasik, Steve
McCain, John
McCarthy, Mary:
and CIA
and Genoa
and NSC
and Office of Intelligence Programs
and Poindexter
and terrorist chatter
and TIA
McConnell, Mike
at Booz Allen
at Cantigny conference
and Clipper chip
and cybersecurity
and dark side of intelligence
as director of national intelligence
and FISA
and immunity from civil suits
and information warfare
as NSA director
Obama briefing by