Deep State

Home > Other > Deep State > Page 39
Deep State Page 39

by Marc Ambinder

“Sealed Document” (Al-Haramain case)

  SEAL Team Six. See also Operation Neptune’s Spear

  Secrecy (Moynihan)

  Secret classification level. See also classified information

  Secret Internet Protocol Router Network (SIPRNet)

  Secret Sentry, The (Aid)

  Secret Service

  Secret Weapon (Lamb, Munsing)

  Sedaghaty, Pirouz (Pete Seda)

  Sensitive Compartmented Information (SCI) clearance

  September 11, 2001 terrorist attacks

  conspiracy theories

  Continuity of Government program

  The 9/11 Commission Report

  NSA and

  partisan transparency

  press and

  Special Capabilities Office and

  See also Operation Neptune’s Spear; Qaeda, al-

  SF-86 security clearance

  Shabbab, al-

  Shachtman, Noah

  Shils, Edward

  Shor, Peter

  Shorrock, Tim

  Siemens

  signals intelligence (SIGINT)

  Sims, Jennifer

  Single Scope Background Investigation

  “Site Post Assignment Log”

  SKOPE (National Geospatial-Intelligence Agency)

  Smith, Walter Bedell

  social media

  civil liberties threatened by

  open source websites and security breaches

  Primoris Era

  “Robin Sage” incident

  U.S. soldiers in war zones

  Somalia

  JSOC missions in

  NSA and

  Soviet Union

  cryptography

  Eisenhower and

  Kennedy on “missile gap”

  Oswald and

  press and confidential information

  See also Russia

  Space Imaging

  Sparks, William Sidney

  special access programs (SAPs)

  Special Air Service (SAS) (Britain)

  Special Capabilities Office (SCO)

  Special Intelligence (SI)

  Special Operations Command (SOCOM)

  specific threat, defined

  Spiegel, Der (Germany)

  SRI International, Stanford University

  STA-6400 Semantic Traffic Analyzers

  state secrets privilege

  drone program

  Foreign Intelligence Surveillance Act

  Al-Haramain case

  El-Masri case

  Mohamed et al. v. Jeppesen Dataplan

  torture of detainees

  United States v. Reynolds

  Status of Forces Agreement (SOFA)

  Stavridis, James

  Stephanopoulos, George

  Stevenson, Adlai

  Stimson, Henry

  Stonestreet, Eric

  Stored Communications Act of 1986 (SCA)

  Stuxnet

  Sulzberger, Arthur Hays

  Swope, Herbert

  Symantec

  Symington, Stuart

  Syria

  nuclear weapon program of

  WikiLeaks on

  Talent-Keyhole (TK)

  Tamm, Terrence

  Task Force Black (Urban)

  Task Force 9-14 (Task Force North)

  Taubman, Phil

  telecommunications industry

  cell phone technology and

  cyber security and

  domestic surveillance and

  See also National Security Agency (NSA)

  Tenet, George

  Terrorist Surveillance Program

  Tether, Tony

  Texas Law Review

  ThinThread (NSA)

  Tice, Russell

  Title 10, U.S. Code

  Title 50, U.S. Code

  Title III, Omnibus Crime Control and Safe Streets Act

  Tonopah Test Range

  Top Secret American (Priest, Arkin)

  Top Secret classification level. See also classified information

  Top Secret/Sensitive Compartmented Information (TOP Secret/SCI) clearance

  Tordella, Louis

  Total Information Awareness (TIA)

  TRACTOR PULL

  Trailblazer

  Truman, Harry

  21st Century Defense Initiative (Brookings Institution)

  Twitter

  “UK-USA agreement”

  uncorroborated/unconfirmed threat, defined

  Uniform Code of Military Justice (USMJ)

  Unit, The (Haney)

  United Kingdom. See Britain

  United States v. Reynolds

  University of Maryland

  Urban, Mark

  U.S. Air Force

  Area 51

  Big Safari Program Office

  cyber security and

  Distributed Common Ground System

  Office of Special Investigations

  Rapid Capability Office

  Ravens (armed personnel)

  Special Capabilities Office

  See also drone warfare

  U.S. Army

  Area 51 and

  Camp Nama (Iraq)

  Delta Force

  detainee abuse in Iraq

  Manning and

  160th Special Operations Aviation Regiment

  Rangers

  Signal Security Agency

  Special Forces training

  Technical Operations Support Activity

  World War II interception capabilities

  See also Delta Force; Iraq War

  U.S. Congress

  cyber security and tech neutrality of

  “Gang of Eight”

  House and Senate select committees on intelligence

  leaks by

  NSA and

  on Stuxnet

  See also partisan transparency

  U.S. Corona (spy satellite)

  U.S. Cyber Command

  U.S. Defense Intelligence Agency (DIA)

  U.S. Department of Defense

  Defense Industrial Base, defined

  JSOC and

  Office of the Secretary of Defense

  Secret Internet Protocol Router Network

  on social media

  Total Information Awareness

  See also interrogation practices; individual branches of military; individual names of wars

  U.S. Department of Energy

  U.S. Department of Justice

  domestic surveillance and

  Al-Haramain case

  NSA and

  “Presidential Authorization for Specified Electronic Surveillance Activities”

  al-Qaeda and

  WikiLeaks and

  U.S. Department of State

  U.S. Embassy (Seoul, South Korea)

  U.S. Foreign Service

  U.S. Joint Special Operations Command (JSOC)

  Afghanistan War

  Cheney and

  CIA “covert action” and

  declassification issues

  Directorate of Operation, Security, and Intelligence Support Division

  drone warfare and

  Intelligence Brigade

  Iraq War

  missions prior to 2000

  Mission Support Activity

  in non-combat zones

  Operation Neptune’s Spear

  Technical Development Activity

  See also Operation Neptune’s Spear

  U.S. Marine Corps

  U.S. National Geospatial-Intelligence Agency

  U.S. Navy. See also SEAL Team Six

  USS Carl Vinson

  USS Maddox

  USS Turner Joy

  Vaught, James

  VENONA

  Verizon

  Vickers, Mike

  vital information. See interrogation practices

  Walker, Judge

  War Powers Act

  Washington Post

  Washington Post-ABC News

  Washington Times

  waterboarding
/>
  Western Union

  Wheeler, Earle

  whistleblowers

  White, René

  White House Correspondents’ Dinner (April 30, 2011)

  WikiLeaks

  “Collateral Murder” (video)

  effect of cables released by

  foreign relations and

  goals of

  on Guantánamo Bay

  interrogation practices by U.S. and

  Manning and

  media reputation and

  New York Times/State Department on

  traditional press and

  Wilson, Joseph

  Wilson, Woodrow

  Wired

  wiretaps. See Foreign Intelligence Surveillance Act (FISA); National Security Agency (NSA)

  Wizner, Ben

  Wolfowitz, Paul

  Woodward, Bob

  XKEYSCORE

  Yardley, Herbert O.

  Yates, Steven

  Yemen

  CTU and

  al-Harethi and

  NSA and

  al-Qaeda and

  Yoo, John

  Young, John

  Zarqawi, Abu Musab, al-

  Zuckerberg, Mark

 

 

 


‹ Prev