The Watchers

Home > Other > The Watchers > Page 50
The Watchers Page 50

by Shane Harris


  U.S. presence of

  and USS Cole

  Al Shiraa

  Amal

  American Civil Liberties Union (ACLU)

  Anschutz, Philip

  antisubmarine warfare

  Arafat, Yasser

  ARDA (Advanced Research and Development Activity)

  Armour, Tom

  Army, U.S.:

  and Achille Lauro

  Army Field Manual

  and IDC, see Information Dominance Center

  Intelligence and Security Command

  Intelligence Command

  and intelligence gap

  Land Information Warfare Activity

  Signals Security Agency

  Ashcroft, John

  AT&T

  Atta, Mohamed

  Aum Shinrikyo

  Bacon, Kevin

  BAG (Big Ass Graph)

  as ADVISE

  creation of

  failures of

  financial data in

  and graph theory

  information overload in

  and metadata

  and Monitor

  Stellar Wind as

  and telecom records

  Baginski, Maureen

  Baltimore Gas & Electric

  Basketball

  Becker, Art

  Beirut, Lebanon:

  killings and kidnappings in

  Marine barracks attacked in

  see also Lebanon

  Berlin Wall, fall of

  Beyster, Bob

  Biden, Joe

  bin Laden, Osama

  Black, Bill

  Black, Hugo L.

  Black Hawk Down (1993)

  Black Panthers

  Blue Dogs

  Boehner, John

  Bojinka

  Booz Allen Hamilton:

  and Clapper

  and cybersecurity to financial sector

  and McConnell

  and TIA

  Brennan, John

  Brenner, Joel

  Britain:

  security threat in

  as surveillance state

  Brown v. Board of Education

  Buckley, William

  Buckley Air Force Base, Colorado

  Bush, George H. W.

  Bush, George W.

  Bush administration:

  and Able Danger cover-up

  and Congress

  and cybersecurity

  and executive war powers

  and FISA

  influence in

  intelligence politicized by

  and Iraqi weapons

  and leaks

  and NSA

  Office of Legal Counsel

  and Office of National Intelligence

  and privacy concerns

  questions of illegality in

  and terrorists

  and Times story

  and warrantless surveillance

  and wiretapping

  CALEA (Communications Assistance for Law Enforcement Act) [1994]

  Cantigny conference

  Card, Andrew

  Carnivore

  Casey, William J.

  Center for Democracy and Technology

  Center for National Security Studies

  Center for Strategic and International Studies

  Cheney, Dick:

  as defense secretary

  and information warfare

  and McConnell

  and TIA/NSA

  as vice president

  Cherry Vanilla World

  Chertoff, Michael:

  and airport security procedures

  and British security threat

  and Cantigny conference

  and Homeland Security

  private counseling firm of

  China:

  hackers in

  missile sales to

  spy network of

  ChoicePoint

  CIA (Central Intelligence Agency):

  and Al Qaeda

  analytic shortcomings of

  and bin Laden

  and British terrorist threat

  changing after 9/11

  communications hotline

  counterterrorist center

  emergency measures in

  and foreign espionage

  and interagency rivalry

  invalid data from

  and Iran-Contra

  and Karic

  laws governing deployment of

  leaks from

  nonproliferation center

  prisons and interrogations run by

  as risk averse

  terrorism as low priority for

  and terrorist funding

  and TIA

  U.S. persons targeted by

  Clancy, Tom, Clear and Present Danger

  Clapper, James

  Clark, Bill

  Clarke, Richard

  Clinton, Hillary Rodham

  Clinton administration

  and Balkans

  and FISA warrants

  and privacy laws

  and wiretapping

  Clipper chip

  Coast Guard, U.S.

  Cohen, William S.

  Comey, James

  Commodore

  Comprehensive National Cybersecurity Initiative

  Congress, U.S.:

  and Able Danger

  antiterrorism laws in

  Blue Dogs in

  and Bush administration

  and electronic surveillance

  and FISA

  and Gang of Eight

  and Iran-Contra

  and NSA

  overlapping executive powers

  Congress, U.S.:

  political enemies in

  and privacy of U.S. persons

  Protect America Act

  and terrorist detention

  and TIA

  USA PATRIOT Act

  Counterterrorism Security Group (CSG)

  “Counterterrorism Technology and Privacy” (McCormick discussion)

  Craxi, Bettino

  Crisis Management Center

  Crisis Pre-Planning Group (CPPG)

  Cruise, Tom

  Customs Bureau, U.S.

  DARPA (Defense Advanced Research Projects Agency):

  Evidence Extraction and Link Discovery

  and Genoa

  Information Awareness Office (IAO)

  Information Systems Office

  and Spinnaker

  and TIA

  Defense Department:

  and Able Danger

  and black budget

  and information warfare

  intelligence budget controlled by

  and interagency rivalry

  and privacy law

  and situational awareness

  Systems Analysis Division

  and TIA

  see also Pentagon, U.S.

  Defense Intelligence Agency (DIA)

  Delta Airlines

  Dempsey, Jim

  Dennis, Steve

  Director of National Intelligence (DNI)

  Disruptive Technology Office

  Dolphin, Glenn

  Downing Assessment Task Force

  Eagle

  Economist

  Edwards, Don

  Edwards, John

  Egypt, and Achille Lauro

  Electronic Communications Privacy Act (ECPA) [1986]

  Emanuel, Rahm

  encryption technology

  Enemy of the State (film)

  EPIC (Electronic Privacy Information Center)

  Executive order 12333 (twelve triple three)

  FAA (Federal Aviation Administration)

  FBI (Federal Bureau of Investigation):

  bureaucracy of

  and ChoicePoint

  data not shared by

  and domestic spying

  emergency measures in

  false accusations by

  Financial Review Group

  and FISA

  and Karic

  and NSA
>
  terrorism as low priority for

  and terrorist interrogation

  and terrorist threat

  and TIA

  wild-goose chases of

  and wiretapping

  FCC (Federal Communications Commission)

  Feinstein, Dianne

  Financial Crimes Enforcement Network (FinCEN)

  First Data, Colorado

  FISA (Foreign Intelligence Surveillance Act) [1978]

  changing language in

  and Congress

  and emergency surveillance

  and Executive order 12333

  and foreign/domestic wall

  and immunity from civil suits

  McConnell’s attempts to update

  passage of

  and Protect America Act

  and September 11 attacks

  sunset clause in

  and warrantless surveillance

  warrants under

  and wiretapping

  FISA Amendments Act

  Fitzgerald, F. Scott

  Flint, Lara

  Foreign Affairs magazine

  Foreign Intelligence Court of Review

  Fourth Amendment

  Freedom of Information Act

  Freeh, Louis J.

  FutureMAP (Futures Markets Applied to Prediction)

  Gang of Eight

  Gates, Robert

  “Geneva,”

  Genoa:

  and Aum Shinrikyo

  building support for

  bureaucratic reluctance to use

  purposes of

  Spinnaker as

  Genoa II

  Gentry, Tony

  Ghorbanifar, Manucher

  Gibbons, James

  Gidari, Al

  Giuliani, Rudy

  Goldman Sachs

  Goldsmith, Jack

  Gonzales, Alberto:

  as attorney general

  and Congress

  and executive powers

  and global telecommunications

  and illegal domestic spying

  and immunity from civil suits

  as president’s lawyer

  and U.S. soldiers in Iraq

  and warrantless surveillance

  Goss, Porter

  GRiD Compass (computer)

  Groundbreaker

  Guantánamo Bay, Cuba

  Gulf War (1991)

  Hadley, Stephen

  Hall, Wilma

  Hamilton, Lee

  Hamre, John:

  and Cantigny conference

  and Center for Strategic and International Studies

  and Chinese spy network

  and data-mining tools

  and IDC

  and TIA

  Harman, Jane

  Harper, Jim

  Hart, Gary

  Hasenfus, Eugene

  hawala (money moving)

  Hawley, Kip

  Hayden, Michael:

  Air Force career

  and BAG

  as CIA director

  and defense of government secrets

  and early-warning system for terrorism

  and FISA

  Hayden, Michael:

  and foreign/domestic intelligence wall

  and National Intelligence Office

  and NSA

  on prisoner interrogation

  and public relations

  and Qwest

  and September 11 attacks

  and technology upgrades

  and TIA

  and Times

  and warrantless surveillance

  Heath, James

  Heritage Foundation

  Hezbollah

  Hicks & Associates

  Highlands Forum, Carmel Valley, California

  Holloway, James

  Homeland Security, Department of:

  and ADVISE

  and Allen

  and British terrorist threat

  and Chertoff

  and cyberdefense

  and data-mining projects

  Data Privacy and Integrity Advisory Committee

  information sources of

  mission areas of

  Hoover, J. Edgar

  Human Identification at a Distance

  Hurricane Katrina

  Hussein, Saddam

  IBM

  Immigration and Naturalization Service (INS)

  Information Awareness Office (IAO):

  and DARPA

  logo for

  media attacks on

  mission of

  and privacy study

  and TIA

  Information Dominance Center (IDC)

  and Able Danger, see Able Danger

  and Al Qaeda

  and Army Intelligence Command

  and China

  and Karic

  and link charts

  and privacy law

  renewal of clearance

  and TIA

  and U.S. Central Command

  and USS Cole

  Information Systems Office

  Inouye, Daniel

  Institute for Defense Analysis

  intelligence:

  black budget for

  budget cutbacks in

  central control of

  covert forces in the field

  dark arts of

  and Executive order 12333

  failures of

  FISA

  flow between governments

  foreign/domestic wall of

  and Gang of Eight

  information overload in

  information retrieval in

  and information warfare

  and interagency cooperation

  and interagency rivalry

  master database for

  metadata in

  and minimization

  and mission creep

  misuse of

  from open sources

  outdated tradecraft of

  politicization of

  private industry mining of

  recommended actions

  restrictions on gathering, storage, and use of

  signals

  systemic overcollection of

  and technology

  on U.S. persons

  warrantless surveillance

  watching the watchers

  Intelligence and Security Command

  Internet:

  and cybersecurity

  e-mail records

  financial news on

  first

  free space of

  hackers on

  intelligence drawn from

  junk spam/noise of

  link charts from

  open sources on

  and privacy

  propaganda spread via

  protection from government control

  and Qwest

  IOWA center

  Iran:

  and Iraq

  Ministry of Information and Security

  regime change in

  and Russian mobsters

  U.S. arms embargo

  U.S. hostages in

  Iran-Contra affair

  and CIA

  commission report on

  and Congress

  and Israel

  and North

  and Poindexter

  and Reagan

  and trial

  and UNODIR

  and U.S. hostages

  Iraq:

  British policy in

  information warfare in

  insurgents in

  intelligence gap in

  and Iran

  Kuwait invaded by

  opponents of war in

  rules of engagement in

  rumors of weapons in

  Saffron in

  U.S. invasion of

  U.S. technology in

  IRS (Internal Revenue Service)

  Israel:

  and Achille Lauro

  and Iran-Contra

  and missile sales

  Palestine vs.


  U.S. policies about

  Israeli Defense Force (IDF)

  Italy, and Achille Lauro

  Jackson, Michael (Homeland Security)

  Japan, Aum Shinrikyo attacks in

  JCAG (Joint Counterintelligence Assessment Group)

  Johns Hopkins, Applied Physics Laboratory

  Johnson, David

  Joint Worldwide Intelligence Communications System

  Jonas, Jeff

  background of

  and data privacy

  and debtor matching

  and Highlands Forum

  and IBM

  and Las Vegas casinos

  and NORA

  JSOC (Joint Special Operations Command), and Achille Lauro

  Justice Department:

  and ChoicePoint

  and intercepted e-mails

  and legality of procedures

  and warrantless surveillance

  and wiretapping

  Karic, Dragomir

  Keller, Bill

  Kennedy, Joseph P.

  Kenya, U.S. embassy attacked in

  Kerr, Donald

  Khobar Towers, Saudi Arabia, bombing of

  Khomeini, Ayatollah Ruhollah

  Kissinger, Henry A.

  Kleinsmith, Erik:

  and Able Danger

  and China

  data deleted by

  influence of

  as intelligence analysis instructor

  and Karic

  and Lockheed Martin

  and privacy law

  and September 11 attacks

  and Special Operations

  Klinghoffer, Leon

  “Knowledge is power,”

  Krongard, A. B. “Buzzy,”

  Kuwait, Iraqi invasion of

  Lake, Tony

  Lambert, Geoffrey

  Land Information Warfare Activity

  Las Vegas, casinos in

  Lawrence Livermore National Laboratory:

  and ADVISE

  IOWA center in

  and Monitor

  on technology and national security

  Leahy, Patrick J.

  Lebanon:

  British policy in

  civil war in

  Sheikh Abdullah barracks in

  Syrian occupation of

  terrorist signals ignored in

  U.S. embassy bombed in

  U.S. government reaction to suicide bombing in

  U.S. hostages in

  U.S. Marines attacked in

  Lehman, John

  Leopold, Reuven

  Libya, and Palestinian terrorists

  Lockheed Martin

  logic layer

  Lohr, Michael

  Lukasik, Steve

  McCain, John

  McCarthy, Mary:

  and CIA

  and Genoa

  and NSC

  and Office of Intelligence Programs

  and Poindexter

  and terrorist chatter

  and TIA

  McConnell, Mike

  at Booz Allen

  at Cantigny conference

  and Clipper chip

  and cybersecurity

  and dark side of intelligence

  as director of national intelligence

  and FISA

  and immunity from civil suits

  and information warfare

  as NSA director

  Obama briefing by

 

‹ Prev