“Sealed Document” (Al-Haramain case)
SEAL Team Six. See also Operation Neptune’s Spear
Secrecy (Moynihan)
Secret classification level. See also classified information
Secret Internet Protocol Router Network (SIPRNet)
Secret Sentry, The (Aid)
Secret Service
Secret Weapon (Lamb, Munsing)
Sedaghaty, Pirouz (Pete Seda)
Sensitive Compartmented Information (SCI) clearance
September 11, 2001 terrorist attacks
conspiracy theories
Continuity of Government program
The 9/11 Commission Report
NSA and
partisan transparency
press and
Special Capabilities Office and
See also Operation Neptune’s Spear; Qaeda, al-
SF-86 security clearance
Shabbab, al-
Shachtman, Noah
Shils, Edward
Shor, Peter
Shorrock, Tim
Siemens
signals intelligence (SIGINT)
Sims, Jennifer
Single Scope Background Investigation
“Site Post Assignment Log”
SKOPE (National Geospatial-Intelligence Agency)
Smith, Walter Bedell
social media
civil liberties threatened by
open source websites and security breaches
Primoris Era
“Robin Sage” incident
U.S. soldiers in war zones
Somalia
JSOC missions in
NSA and
Soviet Union
cryptography
Eisenhower and
Kennedy on “missile gap”
Oswald and
press and confidential information
See also Russia
Space Imaging
Sparks, William Sidney
special access programs (SAPs)
Special Air Service (SAS) (Britain)
Special Capabilities Office (SCO)
Special Intelligence (SI)
Special Operations Command (SOCOM)
specific threat, defined
Spiegel, Der (Germany)
SRI International, Stanford University
STA-6400 Semantic Traffic Analyzers
state secrets privilege
drone program
Foreign Intelligence Surveillance Act
Al-Haramain case
El-Masri case
Mohamed et al. v. Jeppesen Dataplan
torture of detainees
United States v. Reynolds
Status of Forces Agreement (SOFA)
Stavridis, James
Stephanopoulos, George
Stevenson, Adlai
Stimson, Henry
Stonestreet, Eric
Stored Communications Act of 1986 (SCA)
Stuxnet
Sulzberger, Arthur Hays
Swope, Herbert
Symantec
Symington, Stuart
Syria
nuclear weapon program of
WikiLeaks on
Talent-Keyhole (TK)
Tamm, Terrence
Task Force Black (Urban)
Task Force 9-14 (Task Force North)
Taubman, Phil
telecommunications industry
cell phone technology and
cyber security and
domestic surveillance and
See also National Security Agency (NSA)
Tenet, George
Terrorist Surveillance Program
Tether, Tony
Texas Law Review
ThinThread (NSA)
Tice, Russell
Title 10, U.S. Code
Title 50, U.S. Code
Title III, Omnibus Crime Control and Safe Streets Act
Tonopah Test Range
Top Secret American (Priest, Arkin)
Top Secret classification level. See also classified information
Top Secret/Sensitive Compartmented Information (TOP Secret/SCI) clearance
Tordella, Louis
Total Information Awareness (TIA)
TRACTOR PULL
Trailblazer
Truman, Harry
21st Century Defense Initiative (Brookings Institution)
Twitter
“UK-USA agreement”
uncorroborated/unconfirmed threat, defined
Uniform Code of Military Justice (USMJ)
Unit, The (Haney)
United Kingdom. See Britain
United States v. Reynolds
University of Maryland
Urban, Mark
U.S. Air Force
Area 51
Big Safari Program Office
cyber security and
Distributed Common Ground System
Office of Special Investigations
Rapid Capability Office
Ravens (armed personnel)
Special Capabilities Office
See also drone warfare
U.S. Army
Area 51 and
Camp Nama (Iraq)
Delta Force
detainee abuse in Iraq
Manning and
160th Special Operations Aviation Regiment
Rangers
Signal Security Agency
Special Forces training
Technical Operations Support Activity
World War II interception capabilities
See also Delta Force; Iraq War
U.S. Congress
cyber security and tech neutrality of
“Gang of Eight”
House and Senate select committees on intelligence
leaks by
NSA and
on Stuxnet
See also partisan transparency
U.S. Corona (spy satellite)
U.S. Cyber Command
U.S. Defense Intelligence Agency (DIA)
U.S. Department of Defense
Defense Industrial Base, defined
JSOC and
Office of the Secretary of Defense
Secret Internet Protocol Router Network
on social media
Total Information Awareness
See also interrogation practices; individual branches of military; individual names of wars
U.S. Department of Energy
U.S. Department of Justice
domestic surveillance and
Al-Haramain case
NSA and
“Presidential Authorization for Specified Electronic Surveillance Activities”
al-Qaeda and
WikiLeaks and
U.S. Department of State
U.S. Embassy (Seoul, South Korea)
U.S. Foreign Service
U.S. Joint Special Operations Command (JSOC)
Afghanistan War
Cheney and
CIA “covert action” and
declassification issues
Directorate of Operation, Security, and Intelligence Support Division
drone warfare and
Intelligence Brigade
Iraq War
missions prior to 2000
Mission Support Activity
in non-combat zones
Operation Neptune’s Spear
Technical Development Activity
See also Operation Neptune’s Spear
U.S. Marine Corps
U.S. National Geospatial-Intelligence Agency
U.S. Navy. See also SEAL Team Six
USS Carl Vinson
USS Maddox
USS Turner Joy
Vaught, James
VENONA
Verizon
Vickers, Mike
vital information. See interrogation practices
Walker, Judge
War Powers Act
Washington Post
Washington Post-ABC News
Washington Times
waterboarding
/>
Western Union
Wheeler, Earle
whistleblowers
White, René
White House Correspondents’ Dinner (April 30, 2011)
WikiLeaks
“Collateral Murder” (video)
effect of cables released by
foreign relations and
goals of
on Guantánamo Bay
interrogation practices by U.S. and
Manning and
media reputation and
New York Times/State Department on
traditional press and
Wilson, Joseph
Wilson, Woodrow
Wired
wiretaps. See Foreign Intelligence Surveillance Act (FISA); National Security Agency (NSA)
Wizner, Ben
Wolfowitz, Paul
Woodward, Bob
XKEYSCORE
Yardley, Herbert O.
Yates, Steven
Yemen
CTU and
al-Harethi and
NSA and
al-Qaeda and
Yoo, John
Young, John
Zarqawi, Abu Musab, al-
Zuckerberg, Mark
Deep State Page 39