Book Read Free

The Watchers

Page 51

by Shane Harris


  and TIA

  McCormick Tribune Foundation

  “Counterterrorism Technology and Privacy,”

  McFarlane, Robert “Bud”:

  and Achille Lauro

  and Beirut suicide bombing

  and Iran-Contra

  and Poindexter

  resignation of

  McNamara, Robert S.

  McVeigh, Timothy

  Madrid, train bombings in

  Manhattan Project

  Manningham-Buller, Dame Eliza

  Marines, U.S.:

  attacked in Beirut

  pulled out of Lebanon

  rules of engagement

  terrorist threats against

  Markoff, John

  Martin, Kate

  Mayfield, Brandon

  Meese, Edwin III

  Microsoft

  Miers, Harriet

  Milošević,Slobodan

  Mogadishu, Somalia

  Monitor110

  Moreau, Art

  Moussaoui, Zacarias

  MoveOn.org

  Mubarak, Hosni

  Mueller, Robert

  Musawi, Hussein

  Myers-Briggs Type Indicator

  Nacchio, Joe

  National Association of Securities Dealers (NASD)

  National-Geospatial Intelligence Agency

  National Intelligence Office:

  and Hayden

  and McConnell

  and Negroponte

  and 9/11 Commission

  and Tangram

  National Journal

  National Press Club

  National Security Agency (NSA):

  and ADVISE

  after 9/11

  and BAG

  and British terrorist threat

  and Clipper chip

  and cybersecurity

  data shared by

  defense of government secrets

  and digital revolution

  and domestic spying

  and early-warning system for terrorists

  failed technology of

  and FBI

  financial intelligence in

  and FISA

  and foreign/domestic intelligence wall

  and geo-location

  global monitoring system of

  information retrieval for

  and information warfare

  “in-memory” databases

  lack of specificity in

  mandate of

  Operation Shamrock

  and privacy protection

  public image of

  and Qwest

  reputation of

  and September 11 attacks

  and Tangram

  and TIA

  and warrantless surveillance

  National Security Council (NSC):

  and Achille Lauro

  bureaucracy of

  communications hotline

  Counterterrorism Security Group (CSG)

  Crisis Management Center

  Crisis Pre-Planning Group (CPPG)

  and interagency rivalry

  and Iran-Contra

  and Lebanon suicide bombing

  Office of Intelligence Programs

  powers of

  Situation Room

  Special Situation Group

  Terrorist Incident Working Group

  and terrorist interrogations

  National Weather Service

  Navy, U.S.:

  and Achille Lauro

  cutbacks in

  Task Force Alpha

  Negroponte, John:

  and airline security

  and congressional hearings

  as DNI

  Netroots

  New York Stock Exchange

  New York Times:

  on pre-9/11 failures

  on TIA

  on warrantless surveillance

  on worthless intelligence data

  Nicaragua:

  Contra rebels in

  NSC operations in

  9/11 Commission

  NORA (Non-Obvious Relationship Awareness)

  Noreaster

  Northern Ireland, insurgency in

  North, Oliver:

  and Achille Lauro

  and Iran-Contra

  personal traits of

  and satellite photographs

  and terrorism preplanning

  Obama, Barack

  and change as illusion

  election campaign of

  on executive powers

  on immunity from civil suits

  inaugural address of

  intelligence briefings of

  split with the party

  on terrorist detention and interrogation

  and warrantless surveillance

  and war on terror

  O’Neill, Dick

  Operation Desert Storm

  Operation Green Quest

  Operation Shamrock

  Pakistan:

  Al Qaeda in

  extremists in

  Palestine:

  Israel vs.

  and Libya

  Palestinian Liberation Front (PLF)

  Pan Am Flight 103 bombing

  Panetta, Leon

  Parentage (visualization program)

  Paulson, Henry

  Paxton, Bill

  Payne, James

  Pelosi, Nancy

  Pentagon, U.S.:

  and Able Danger

  Advanced Systems and Concepts Office

  bureaucracy of

  and Chinese spies

  Criminal Investigation Task Force

  emergency measures in

  futurist projects of

  global network operations of

  and interagency rivalry

  and privacy law

  restrictions on Marines by

  September 11 attack on

  and TIA

  Perry, William

  Phillips, Jonathon

  Philpot, Scott:

  and Able Danger

  and Al Qaeda

  and destroyed data

  and IDC

  Pickering, Thomas

  PLF (Palestinian Liberation Front)

  Poindexter, John:

  and Achille Lauro

  author’s contacts with

  and Beirut suicide bombing

  career of

  on changing the world

  credibility of

  current status of

  gag order on

  and Iran-Contra

  legacy of

  and loyalty

  as national security adviser

  privacy concerns of

  and privacy conference

  privacy invaded

  public respect for

  and retirement

  and September 11 attacks

  and Syracuse debate

  and technology

  and TIA, see TIA

  Poindexter, Linda

  Poindexter, Mark

  Poindexter, Tom

  Polski, Paul

  Popp, Bob:

  and Advanced Systems and Concepts Office

  and ARDA

  and Congress

  and homeland security

  and IAO logo

  and NORA

  and privacy

  and TIA

  Potenza, Vito

  Powell, Colin L.

  Preisser, Eileen

  President’s Daily Brief

  Privacilla

  privacy law

  and cybersecurity

  DOD 5240.1-R

  Electronic Communications Privacy Act

  and executive war powers

  foreign/domestic intelligence wall in

  and IDC

  and the Internet

  and NSA surveillance

  and Protect America Act

  see also FISA

  Protect America Act

  Qwest Communications

  RAM (random access memory)

  and in-memory databases

  and
logic layer

  Rauf, Rashid

  Raytheon

  Reagan, Ronald

  and Achille Lauro

  in a fog

  and Iran-Contra

  and kidnappings in Lebanon

  Medal of Freedom for

  and NSA

  Reagan administration:

  and Beirut suicide bombing

  and Iran-Contra

  Reagan administration:

  and national security

  recruitment for

  and Sheikh Abdullah barracks

  and war against terrorism

  Reid, Harry

  Reid, John

  Reno, Janet

  Research Development and Experimental Collaboration (RDEC)

  Reyes, Silvestre

  Rice, Condoleezza

  Risk Assessment and Horizon Scanning

  Roberts, Julia

  Roberts, Pat

  Rockefeller, John

  Rosa, Gerardo de

  Rosen, Jeffrey

  Rotenberg, Marc

  Rudman, Warren

  Rumsfeld, Donald H.:

  and CIA

  and FutureMAP

  gag order from

  and Poindexter

  political enemies of

  and war in Iraq

  Russia, submarines (“goblins”) of

  Ryan, Meg

  Saffron

  Safire, William

  SAIC

  St. Lawrence River, spy network on

  San Francisco Weekly

  SARS virus

  Schoomaker, Peter

  Schumer, Charles

  Schwarzenegger, Arnold

  Science Applications International Corporation

  Sears Tower plot

  Senator, Ted

  September 11 attacks

  advance warnings of

  aftereffects of

  and Al Qaeda

  anniversary of

  and aviation security

  and change in administration

  and Hayden

  and Moussaoui

  9/11 Commission report

  pattern analysis of

  and Poindexter

  and war on terror

  Shaffer, Tony

  Sharkey, Brian:

  and DARPA

  and Spinnaker

  and Syntek

  and TIA

  Sharqi

  Shultz, George P.

  Signals Security Agency

  Silberman, Lawrence

  Simhoni, Uri

  Singapore, government of

  Six Degrees of Kevin Bacon

  Smart, J. C.

  Soiffert, Alan

  Southern Pacific Railroad

  Speakes, Larry

  Special Forces, and Al Qaeda

  Special Operations Command:

  and Al Qaeda

  and bin Laden

  hunting terrorists

  and privacy law

  Specter, Arlen

  Spinnaker

  Stark, Jim

  Star Trek (films)

  State Department, U.S.:

  access restricted by

  bureaucracy of

  communications hotline

  conference on global threats

  emergency measures in

  foreign/domestic terrorism

  and interagency rivalry

  Steinhardt, Barry

  Stellar Wind

  Stethem, Robert

  Stevens, Ted

  Stewart, Jeff

  Stiner, Carl

  Strategic Command, U.S.

  surveillance:

  and BAG

  in Britain

  and Bush, see Bush administration

  court use of evidence

  electronic

  of e-mails

  emergency

  and FISA, see FISA

  inaccuracy of

  legality of

  and national security

  and Obama administration

  and privacy law

  and Protect America Act

  targeted, vs. metadata

  and telecom companies, see telecommunications

  uncontrolled

  and USA PATRIOT Act

  warrantless

  and wiretaps

  surveillance state, rise of

  Syntek

  Syracuse University

  Talbott, Strobe

  Tandy Corporation

  Tangram

  Tanzania, U.S. embassy attacked in

  Task Force Alpha

  Taylor, Elizabeth

  telecommunications:

  CALEA

  call detail records of

  cellphones

  Clipper chip

  debates on

  digital

  and digital spies

  and encryption technology

  global monitoring of

  immunity from civil suits

  intelligence capability in

  and Internet control

  metadata from

  and privacy laws

  proposed legislation on

  U.S. as hub of

  and warrantless surveillance

  wiretapping

  Tenet, George J.:

  and Brennan

  as CIA director

  and congressional briefing

  and Hayden

  and Karic

  and September 11 attacks

  and weapons in Iraq

  and Weldon

  Terrorism Tuesday

  terrorists:

  Al Qaeda, see Al Qaeda

  and BAG

  bomb-building

  British cell of

  connections among

  detention and interrogations of

  terrorists:

  early-warning system for

  funding streams of

  geo-location of

  guilt by association

  information on Internet about

  and information warfare

  Libya as state sponsor of

  metadata on

  “nexus of terrorism,”

  pattern analysis of

  and public fears

  red team on

  signals of

  suicide bombing by

  transnational

  on U.S. soil

  warrantless surveillance of

  and wealth gap

  Terrorist Threat Integration Center

  Tether, Tony:

  and DARPA

  and TIA

  Thach, John

  Thach Weave

  Thatcher, Margaret

  ThinkProgress.org

  Threat and Vulnerability Information System

  TIA (total information awareness):

  ussured transition to

  automated translation in

  basic concept of

  and Basketball

  black budget of

  campaign to build support for

  collective reasoning process in

  and Congress

  and DARPA

  and Eagle

  entity databases of

  facial recognition techology

  false positives in

  feasibility of

  and foreign/domestic wall

  and Genoa II

  goal of

  and IAO

  immutable audit trail in

  and information overload

  nonterrorist baselines produced by

  and NORA

  and NSA

  policy debate on

  PowerPoint briefing on

  preliminary thinking on

  privacy protection in

  prototype of

  public attacks on

  rank-ordered list of targets for

  recruitment for

  red teams of

  research thrusts of

  selective revelation in

  speed of work

  termination as such

  Times article about

  transiti
on to other programs

  TIA Network

  and ADVISE

  entity databases of

  and RDEC

  rules of membership in

  Time

  Topsail

  Townsend, Fran:

  and Brennan

  and Coast Guard

  and influence

  and Iraq

  and terrorism brief

  and TIA

  Transportation Security Administration (TSA)

  Treasury Department:

  Financial Crimes Enforcement Network

  on terrorist financing

  TWA Flight

  United Kingdom:

  security threats in

  as surveillance state

  UNIVAC

  UNODIR

  USA PATRIOT Act

  USA Today

  U.S. Central Command

  U.S. Naval Institute

  U.S. persons:

  ChoicePoint data collected on

  communication with foreign parties

  definition of

  and FISA

  intelligence on

  and privacy law

  and September 11 attacks

  targeting for political purposes

  warrantless surveillance on

  U.S. Strategic Command

  U.S. Telephone Association

  USS Cole

  USS Holder

  USS Iwo Jima

  Vanilla World

  Veliotes, Nicholas

  Wade, Alan

  Wall Street:

  and cybersecurity

  and FutureMAP

  intelligence gathering on

  war:

  antisubmarine

  executive powers in

  information warfare

  proportionality of

  rules of engagement

  science of

  and technology

  War Games (film)

  Warner, John

  war on terror:

  CIA leaks about

  misuse of intelligence in

  and Obama administration

  preemption vs. retaliation in

  and Reagan administration

  secret

  and September 11 attacks

  Use of fear in

  use of intelligence in

  and Watchers

  see also Bush administration

  Warren, Earl

  Washington, Denzel

  Washington Post

  Washington Post smell test

  Watchers:

  goal of

  scope of their net

  and security vs. liberty

  and war on terror

  watching

  what they are

  Watergate

  Weinberger, Caspar:

  and Achille Lauro

  plans canceled by

  Weldon, Curt:

  and Able Danger

  and China

  and former Yugoslavia

  Wertheimer, Mike:

  and e-mail searches

  and executive war powers

  and privacy laws

  and September 11 attacks

  and signals intelligence

  and warrantless searches

  West Berlin, disco bombed in

  Western Union

  West German government, and Achille Lauro

  World Trade Center:

  1993 truck bomb in

  September 11, 2001, attacks on

  Wyden, Ron

  Yoo, John

 

‹ Prev