1150:
667:
792:
65:
20:
877:
1014:
1091:
752:
privacy and civil liberties or the
President certified the program's research as vital to national security interests. In February 2003, Congress passed legislation suspending activities of the IAO pending a Congressional report of the office's activities (Consolidated Appropriations Resolution, 2003, No.108–7, Division M, §111(b) ).
1062:
focused on providing advanced decision-support and collaboration tools to rapidly deal with and adjust to dynamic crisis management and allow for inter-agency collaboration in real-time. Another function was to be able to make estimates of possible future scenarios to assist intelligence officials in
719:
The TIA program itself was the "systems-level" program of the IAO that intended to integrate information technologies into a prototype system to provide tools to better detect, classify, and identify potential terrorists with the goal to increase the probability that authorized agencies of the United
1173:
speech, which is much more complex due to an essentially unlimited vocabulary and grammar, the
Communicator program is directed task specific issues so that there are constrained vocabularies (the system only needs to be able to understand language related to war). Research was also started to focus
980:
techniques for avoiding surprise and predicting future events. The intent was to explore the feasibility of market-based trading mechanisms to predict political instability, threats to national security, and other major events in the near future. In layman's terms, FutureMap would be a website that
723:
As a systems-level program of programs, TIA's goal was the creation of a "counter-terrorism information architecture" that integrated technologies from other IAO programs (and elsewhere, as appropriate). The TIA program was researching, developing, and integrating technologies to virtually aggregate
1109:
transcription technology whose output is substantially richer and much more accurate than previously possible. The aim of EARS was to focus on everyday human-to-human speech from broadcasts and telephone conversations in multiple languages. It is expected to increase the speed with which speech can
992:
said on the floor of the Senate "I couldn't believe that we would actually commit $ 8 million to create a Web site that would encourage investors to bet on futures involving terrorist attacks and public assassinations. ... I can't believe that anybody would seriously propose that we trade in death.
899:
and a foreign intelligence database. The World Wide Web is considered an "unstructured public data source" because it is publicly accessible and contains many different types of data—such as blogs, emails, records of visits to web sites, etc.—all of which need to be analyzed and stored efficiently.
864:
EELD was designed to design systems with the ability to extract data from multiple sources (e.g., text messages, social networking sites, financial records, and web pages). It was to develop the ability to detect patterns comprising multiple types of links between data items or people communicating
763:
Information
Awareness Program and emphasized that the program was not designed to compile dossiers on US citizens, but rather to research and develop the tools that would allow authorized agencies to gather information on terrorist networks. Despite the name change and these assurances, the critics
715:
Information
Awareness Program in May that year after an adverse media reaction to the program's implications for public surveillance. Although TIA was only one of several IAO projects, many critics and news reports conflated TIA with other related research projects of the IAO, with the result that
1189:
Despite the withdrawal of funding for the TIA and the closing of the IAO, the core of the project survived. Legislators included a classified annex to the
Defense Appropriations Act that preserved funding for TIA's component technologies, if they were transferred to other government agencies. TIA
894:
technology at the time was insufficient for storing and organizing such enormous quantities of data. So they developed techniques for virtual data aggregation in order to support effective analysis across heterogeneous databases, as well as unstructured public data sources, such as the World Wide
751:
would have prohibited the IAO from operating within the United States unless specifically authorized to do so by
Congress, and would have shut the IAO down entirely 60 days after passage unless either the Pentagon prepared a report to Congress assessing the impact of IAO activities on individual
1168:
of the dialogue in order to improve performance, and to be capable of automatically adapting to new topics (because situations quickly change in war) so conversation is natural and efficient. The
Communicator program emphasized task knowledge to compensate for natural language effects and noisy
937:
The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people
767:
As a result, House and Senate negotiators moved to prohibit further funding for the TIA program by adding provisions to the
Department of Defense Appropriations Act, 2004 (signed into law by President Bush on October 1, 2003). Further, the Joint Explanatory Statement included in the conference
1160:
was to develop "dialogue interaction" technology that enables warfighters to talk with computers, such that information will be accessible on the battlefield or in command centers without ever having to touch a keyboard. The
Communicator Platform was to be both wireless and mobile, and to be
630:
It was achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a
903:
Another goal was to develop "a large, distributed system architecture for managing the huge volume of raw data input, analysis results, and feedback, that will result in a simpler, more flexible data store that performs well and allows us to retain important data indefinitely."
1447:
The
Information Awareness Office's official seal features an occult pyramid topped with mystic all-seeing eye, like the one on the dollar bill. Its official motto is "Scientia Est Potentia," which doesn't mean "science has a lot of potential." It means "knowledge is
727:
Among the other IAO programs that were intended to provide TIA with component data aggregation and automated analysis technologies were the Genisys, Genisys Privacy Protection, Evidence Extraction and Link Discovery, and Scalable Social Network Analysis programs.
1082:) focused on developing automated technology capable of identifying predictive indicators of terrorist activity or impending attacks by examining individual and group behavior in broad environmental context and examining the motivation of specific terrorists.
1190:
projects continued to be funded under classified annexes to Defense and Intelligence appropriation bills. However, the act also stipulated that the technologies be used only for military or foreign intelligence purposes involving foreigners.
1193:
TIA's two core projects are now operated by Advanced Research and Development Activity (ARDA) located among the 60-odd buildings of "Crypto City" at NSA headquarters in Fort Meade, MD. ARDA itself has been shifted from the NSA to the
734:
In addition to the program itself, the involvement of Poindexter as director of the IAO also raised concerns among some, since he had been earlier convicted of lying to Congress and altering and destroying documents pertaining to the
1205:
One technology, codenamed "Basketball", is the Information Awareness Prototype System, the core architecture to integrate all the TIA's information extraction, analysis, and dissemination tools. Work on this project is conducted by
1124:
aimed to develop rapid, two-way, natural language speech translation interfaces and platforms. Its goal was to help the warfighter in field environments to complete tasks such as force protection, refugee processing, and medical
724:
data, to follow subject-oriented link analysis, to develop descriptive and predictive models through data mining or human hypothesis, and to apply such models to additional datasets to identify terrorists and terrorist groups.
1210:
through its former Hicks & Associates consulting arm, and run by former Defense and military officials and which had originally been awarded US$ 19 million IAO contract to build the prototype system in late 2002.
938:
around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
701:
Poindexter and Hicks had previously worked together on intelligence-technology programs for the Defense Advanced Research Projects Agency. DARPA agreed to host the program and appointed Poindexter to run it in 2002.
1140:
aimed to develop the necessary information technologies and resulting prototype capable of detecting the covert release of a biological pathogen automatically, and significantly earlier than traditional approaches.
857:) developed technologies and tools for automated discovery, extraction and linking of sparse evidence contained in large amounts of classified and unclassified data sources (such as phone call records from the
1415:
The Prism logo is slightly more opaque than the one used by the US government's Information Awareness Office, which boasted an all-seeing eye atop a pyramid, casting a golden light across an adjacent planet
895:
Web. "Effective analysis across heterogenous databases" means the ability to take things from databases which are designed to store different types of data—such as a database containing criminal records, a
746:
introduced legislation to suspend the activity of the IAO and the Total Information Awareness program pending a Congressional review of privacy issues involved. A similar measure introduced by Senator
1028:) developed advanced language processing technology to enable English speakers to find and interpret critical information in multiple languages without requiring knowledge of those languages.
868:
It is designed to link items relating potential "terrorist" groups and scenarios, and to learn patterns of different groups or scenarios to identify new organizations and emerging threats.
1492:
371:
1259:
in which he claimed " has been given a $ 200 million budget to create computer dossiers on 300 million Americans." Safire has been credited with triggering the anti-TIA movement.
1113:
The intent is to create a core enabling technology (technology that is used as a component for future technologies) suitable for a wide range of future surveillance applications.
1218:) and would provide IT tools to help anticipate and preempt terrorist attacks. SAIC has also been contracted to work on Topsail, including a US$ 3.7 million contract in 2005.
811:
identification technologies to detect, recognize and identify humans at great distances for "force protection", crime prevention, and "homeland security/defense" purposes.
1240:
on February 13, 2002. Initial reports contained few details about the program. In the following months, as more information emerged about the scope of the TIA project,
442:
1594:"Congress's action did not end the Total Information Awareness program. The National Security Agency secretly decided to continue it through its private contractors."
1523:
907:
Genisys had an internal "Privacy Protection Program." It was intended to restrict analysts' access to irrelevant information on private U.S. citizens, enforce
406:
731:
On August 2, 2002, Poindexter gave a speech at DARPAtech 2002 entitled "Overview of the Information Awareness Office" in which he described the TIA program.
1551:
776:
IAO research was conducted along five major investigative paths: secure collaboration problem solving; structured discovery; link and group understanding;
2744:
1345:
2623:
2754:
1286:
635:. The information was then analyzed for suspicious activities, connections between individuals, and "threats". The program also included funding for
998:
997:, Ron Wyden said, "The idea of a federal betting parlor on atrocities and terrorism is ridiculous and it's grotesque." The ranking Democrat on the
1005:
of Michigan, thought the program was so ridiculous that he thought initial reports of it were the result of a hoax. The program was then dropped.
2377:(Remarks as prepared for delivery by John Poindexter, Director, Information Awareness Office, at the DARPATech 2002 Conference) (August 2, 2002).
1094:
Graphic from the Information Awareness Office's website describing the goals of the Effective, Affordable, Reusable Speech-to-Text (EARS) project
84:
2401:
2245:
1329:
1207:
687:
586:
246:
1919:
670:
Diagram of Total Information Awareness system, taken from official (decommissioned) Information Awareness Office website (click to enlarge)
94:
2653:
2345:
2759:
2214:
993:... How long would it be before you saw traders investing in a way that would bring about the desired result?" Democratic Senator from
986:
608:
251:
2530:
1950:
2596:
1732:
1307:
2546:
2175:
2049:
1859:
1639:
1604:
679:
125:
2677:
2454:
2020:
1991:
2144:
1825:
831:
Develop a low power millimeter wave radar system for wide field of view detection and narrow field of view gait classification.
759:
provided Congress on May 20, 2003 with a report on its activities. In this report, IAO changed the name of the program to the
2193:
2111:
2082:
1791:
926:
for modeling the key characteristics of terrorist groups and discriminating these groups from other types of societal groups.
2573:
231:
89:
241:
828:
Develop and demonstrate a human identification system that operates out to 150 meters (500 ft) using visible imagery.
485:
2387:
655:
391:
266:
205:
2295:
795:
Diagram (from official IAO site) describing capabilities of the "Human Identification at a Distance (HumanID)" project
1899:
1591:
1199:
739:, although those convictions were later overturned on the grounds that the testimony used against him was protected.
579:
165:
1397:
1315:, a collection of wikis used by the U.S. intelligence community to "connect the dots" between pieces of intelligence
1302:
312:
985:
would have been the federal government. Several Senators were outraged at the very notion of such a program. Then
2631:
155:
1202:). They are funded by National Foreign Intelligence Program for foreign counterterrorism intelligence purposes.
2550:
2521:
79:
1461:
416:
160:
2684:
1340:
1195:
572:
236:
175:
46:
768:
committee report specifically directed that the IAO as program manager for TIA be terminated immediately.
1756:
1170:
707:
624:
2581:
887:
aimed at developing technologies which would enable "ultra-large, all-source information repositories".
2749:
2718:
2360:
1767:
Department of Defense Appropriations Act, 2004, Pub. L. No. 108–87, § 8131, 117 Stat. 1054, 1102 (2003)
226:
2473:
K. A. Taipale (2003). "Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data".
1493:"Obama Administration Anti-Leak Scheme Shows Precrime and Total Information Awareness Go Hand In Hand"
1429:
1374:
1149:
2242:
838:
639:
technologies that could identify and track individuals using surveillance cameras and other methods.
401:
386:
2321:
1695:
1031:
Outside groups (such as universities, corporations, etc.) were invited to participate in the annual
650:
in 2003. However, several IAO projects continued to be funded under different names, as revealed by
691:
560:
550:
526:
381:
261:
221:
2495:
973:
930:
923:
521:
2640:
1976:
1927:
818:
Develop algorithms for locating and acquiring subjects out to 150 meters (500 ft) in range.
666:
2739:
2661:
2641:"Total Preparedness: The case for the Defense Department's Total Information Awareness project"
1283:, or CTS, a project to link up all security cameras citywide and "track everything that moves".
960:
647:
200:
185:
2486:
1466:
1280:
1178:
1032:
1017:
Goals of the Translingual Information Detection, Extraction and Summarization (TIDES) project
437:
31:
2699:
2547:"Total/Terrorism Information Awareness (TIA): Is It Truly Dead? EFF: It's Too Early to Tell"
2517:
2222:
642:
Following public criticism that the technology's development and deployment could lead to a
2586:
475:
470:
130:
2364:
8:
2538:
1947:
1528:
1036:
506:
322:
170:
55:
2600:
2554:
1736:
1671:
2409:
2281:
2172:
2057:
1867:
1647:
1612:
1232:
890:
Vast amounts of information were going to be collected and analyzed, and the available
736:
616:
480:
1177:
Live exercises were conducted involving small unit logistics operations involving the
1153:
Diagram (from official IAO site) describing capabilities of the "Communicator" project
2688:
2482:
2028:
1999:
1895:
1587:
1324:
1241:
1174:
on foreign language computer interaction for use in supporting coalition operations.
1067:
program which is designed to assist Army commanders in making battlefield decisions.
977:
896:
858:
777:
643:
636:
620:
611:(DARPA) in January 2002 to bring together several DARPA projects focused on applying
460:
2152:
1833:
2435:
Bray, Hiawatha (April 4, 2003). "Mining Data to Fight Terror Stirs Privacy Fears".
2190:
2119:
1799:
1355:
1350:
1227:
1058:
555:
538:
317:
302:
2265:
2090:
2374:
2368:
2249:
2197:
2179:
1954:
1889:
1720:
1274:
675:
543:
465:
366:
356:
351:
1552:"Pentagon Plans a Computer System That Would Peek at Personal Data of Americans"
834:
Characterize gait performance from video for human identification at a distance.
2534:
1434:
1256:
1244:
became concerned over what they saw as the potential for the development of an
1106:
651:
632:
327:
2569:
2496:"Countering Terrorism through Information and Privacy Protection Technologies"
2733:
2445:
1297:
1052:
743:
683:
516:
1402:
1312:
1237:
1184:
612:
533:
511:
292:
1571:
989:
908:
791:
716:
TIA came in popular usage to stand for an entire subset of IAO programs.
140:
1271:, full population data mining & analysis to "monitor social threats"
694:
with the idea for an information awareness program after the attacks of
1064:
1002:
954:
297:
150:
1524:"U.S. Never Really Ended Creepy "Total Information Awareness" Program"
1085:
1586:
Dismantling the Empire: America's Last Best Hope By Chalmers Johnson
1334:
1318:
1245:
982:
808:
748:
615:
and information technology to track and monitor terrorists and other
501:
332:
256:
195:
110:
2725:. pp. A19 (discussing opposition to the IAO FutureMap project).
2705:. DOD Technology and Privacy Advisory Committee (TAPAC). March 2004.
2361:
https://web.archive.org/web/20021123234437/http://www.darpa.mil/iao/
948:
1924:
Northeastern University College of Computer and Information Science
1215:
891:
764:
continued to see the system as prone to potential misuse or abuse.
307:
135:
16:
DARPA division overseeing the "Total Information Awareness" program
2675:
1035:, topic detection and tracking, automatic content extraction, and
981:
allowed people to bet on when a terrorist attack would occur. The
2531:"TIA: Information Awareness Office Makes Us a Nation of Suspects"
1291:
911:
and policies via software mechanisms, and report misuse of data.
180:
145:
120:
64:
1605:"Total/Terrorism Information Awareness (TIA): Is It Truly Dead?"
1022:
Translingual Information Detection, Extraction and Summarization
2493:
1891:
Counterterrorism and Cybersecurity: Total Information Awareness
1497:
1268:
1126:
994:
786:
276:
865:(e.g., financial transactions, communications, travel, etc.).
1378:
1214:
The other project has been re-designated "Topsail" (formerly
1070:
756:
115:
27:
2570:"Total 'Terrorism' Information Awareness (TIA): Latest News"
2284:, National Journal, 23 February 2006, retrieved 27 July 2007
1382:
2426:
Webb, Cynthia L. (May 21, 2003). "The Pentagon's PR Play".
2359:
Copies of the original IAO web pages formerly available at
1894:(2, illustrated, revised ed.). Springer. p. 141.
1040:
822:
711:(TIA) Program in February 2003 but renamed the program the
695:
271:
190:
19:
2494:
Robert Popp and John Poindexter (November–December 2006).
876:
780:
visualization; and decision making with corporate memory.
2149:
Information Awareness Office (official website -- mirror)
1996:
Information Awareness Office (official website -- mirror)
1830:
Information Awareness Office (official website -- mirror)
1796:
Information Awareness Office (official website -- mirror)
845:
1185:
Components of TIA projects that continue to be developed
1063:
deciding what to do, in a manner similar to the DARPA's
1013:
2597:"Information Awareness Office Website Deletes Its Logo"
2209:
2207:
2205:
1164:
The dialogue interaction software was to interpret the
1090:
2455:"Chief Takes Over at Agency to Thwart Attacks on U.S."
705:
The IAO began funding research and development of the
2700:"Safeguarding Privacy in the Fight Against Terrorism"
2296:"Chief Takes Over at Agency To Thwart Attacks on U.S"
1666:
1664:
2202:
825:
recognition into a 24/7 human identification system.
2076:
2074:
1486:
1484:
1086:
Effective Affordable Reusable Speech-to-text (EARS)
914:
2678:"Using Technology to Detect and Prevent Terrorism"
1854:
1852:
1850:
1786:
1784:
1782:
1661:
1346:Synthetic Environment for Analysis and Simulations
2654:"Big Brother and Another Overblown Privacy Scare"
1609:Electronic Frontier Foundation (official website)
1427:
1287:Communications Assistance For Law Enforcement Act
1161:designed to function in a networked environment.
949:Futures Markets Applied to Prediction (FutureMAP)
2731:
2266:The Total Information Awareness Project Lives On
2071:
1986:
1984:
1972:
1970:
1968:
1966:
1964:
1962:
1481:
1181:to test the technology in extreme environments.
1110:be processed by computers by 100 times or more.
2528:
2363:(June 12, 2002 – June 3, 2003) can be found at
2219:Information Awareness Office (official website)
2139:
2137:
2054:Information Awareness Office (official website)
2025:Information Awareness Office (official website)
1864:Information Awareness Office (official website)
1847:
1820:
1818:
1816:
1779:
1733:"Search Results - THOMAS (Library of Congress)"
1633:
1631:
1629:
1597:
1567:
1565:
1459:
1221:
2118:. Information Awareness Office. Archived from
2042:
1776:149 Cong. Rec. H8755—H8771 (24 September 2003)
1543:
1330:Multistate Anti-Terrorism Information Exchange
1169:environments. Unlike automated translation of
837:Develop a multi-spectral infrared and visible
2472:
2013:
1981:
1959:
580:
2375:Overview of the Information Awareness Office
2134:
2112:"Wargaming the Asymmetric Environment (WAE)"
1813:
1721:Overview of the Information Awareness Office
1626:
1576:Electronic Privacy Information Center (EPIC)
1562:
1549:
1294:, NSA worldwide digital interception program
1099:Effective Affordable Reusable Speech-to-text
787:Human Identification at a Distance (HumanID)
2676:Shane Ham & Robert D. Atkinson (2002).
1920:"Current Research in Social Network Theory"
2621:
2582:"A Times Editorial: Unfocused data-mining"
2446:"Pentagon database plan hits snag on Hill"
1517:
1515:
1071:Wargaming the Asymmetric Environment (WAE)
587:
573:
2745:Government databases in the United States
2443:
2417:"Pentagon Defends Surveillance Program".
2256:, 8 February 2006, retrieved 27 July 2007
1913:
1911:
933:said the following in his study of SSNA:
609:Defense Advanced Research Projects Agency
2755:2002 establishments in the United States
2716:
2652:Taylor, Stuart Jr. (December 10, 2002).
2622:Mac Donald, Heather (January 27, 2003).
1826:"Evidence Extraction and Link Discovery"
1490:
1308:Information Processing Technology Office
1148:
1089:
1012:
922:aimed at developing techniques based on
875:
861:, internet histories, or bank records).
790:
665:
18:
2452:
2293:
2272:, 26 April 2006, retrieved 27 July 2007
2083:"EFF: Memorandum Regarding TIA Funding"
2080:
1521:
1512:
1395:
920:Scalable Social Network Analysis (SSNA)
680:United States National Security Advisor
607:) was established by the United States
2732:
2651:
2462:First mainstream media mention of IAO.
2444:McCullagh, Declan (January 15, 2003).
2399:
2319:
1908:
1757:The Global Information Society Project
1693:
1689:
1687:
1685:
1637:
1428:Hendrik Hertzberg (December 9, 2002).
851:Evidence Extraction and Link Discovery
846:Evidence Extraction and Link Discovery
720:States could preempt adverse actions.
674:The IAO was established after Admiral
2639:Levin, Jonathan (February 13, 2003).
2638:
2594:
2574:Electronic Privacy Information Center
2529:Charles V. Peña (November 22, 2002).
1460:Jonathan Turley (November 17, 2002).
1277:, FBI US digital interception program
966:Futures Markets Applied to Prediction
690:executive Brian Hicks approached the
2475:Columbia Sci. & Tech. Law Review
2466:
2434:
2425:
1792:"Human Identification at a distance"
1226:The first mention of the IAO in the
1076:Wargaming the Asymmetric Environment
2453:Markoff, John (February 13, 2002).
2400:Harris, Shane (February 26, 2006).
2294:Markoff, John (February 13, 2002).
1887:
1881:
1682:
1132:
1046:
486:Surveillance issues in smart cities
13:
2717:Ignatius, David (August 1, 2003).
2615:
2518:"TIA: Total Information Awareness"
2353:
1917:
1550:John Markoff (November 22, 2002).
801:Human Identification at a Distance
656:2013 mass surveillance disclosures
206:Jindalee Operational Radar Network
23:Information Awareness Office seal
14:
2771:
2760:Organizations established in 2002
2599:. The Memory Hole. Archived from
2510:
2481:(2): 1–83 (TIA discussed 39–50).
2393:
2381:
2081:Belasco, Amy (January 21, 2003).
1572:Total Information Awareness (TIA)
1200:Director of National Intelligence
755:In response to this legislation,
1398:"What does the Prism logo mean?"
1303:Government Information Awareness
915:Scalable Social Network Analysis
814:Its goals included programs to:
646:system, the IAO was defunded by
63:
2339:
2313:
2287:
2275:
2259:
2236:
2184:
2166:
2104:
1941:
1770:
1761:
1750:
1725:
1714:
1672:"U.S. Still Mining Terror Data"
1144:
2551:Electronic Frontier Foundation
2522:American Civil Liberties Union
2320:Safire, William (2002-11-14).
2243:Wanted: Competent Big Brothers
2087:Electronic Frontier Foundation
1638:Harris, Shane (Feb 23, 2006).
1580:
1453:
1421:
1389:
1375:"Information Awareness Office"
1367:
807:) project developed automated
1:
1694:Lundin, Leigh (7 July 2013).
1361:
783:Among the IAO projects were:
742:On January 16, 2003, Senator
417:Investigatory Powers Act 2016
2685:Progressive Policy Institute
2388:Information Awareness Office
1888:Lee, Newton (7 April 2015).
1696:"Pam, Prism, and Poindexter"
1341:PRISM (surveillance program)
1222:Media coverage and criticism
1196:Disruptive Technology Office
880:Goals of the Genysis project
601:Information Awareness Office
7:
2503:IEEE Security & Privacy
1462:"George Bush's Big Brother"
1321:—similar program to HumanID
1262:
771:
708:Total Information Awareness
625:Total Information Awareness
10:
2776:
1702:. Washington: SleuthSayers
1248:mass surveillance system.
1116:
972:) was intended to harness
958:
952:
871:
661:
2624:"Total Misrepresentation"
839:facial recognition system
654:during the course of the
402:National Intelligence Law
387:Data Protection Directive
1008:
999:Armed Services Committee
692:US Department of Defense
561:Nothing to hide argument
382:Data Retention Directive
2719:"Back in the Safe Zone"
974:collective intelligence
931:Northeastern University
924:social network analysis
1611:. 2003. Archived from
1430:"Too Much Information"
1337:concept in criminology
1255:published a column by
1251:On November 14, 2002,
1154:
1105:) developed automatic
1095:
1018:
987:Senate Minority Leader
961:Policy Analysis Market
946:
881:
796:
671:
637:biometric surveillance
201:Mastering the Internet
39:
2664:on December 26, 2002.
2634:on February 10, 2013.
1467:The Los Angeles Times
1281:Combat Zones That See
1179:United States Marines
1152:
1093:
1033:information retrieval
1016:
959:Further information:
935:
879:
794:
669:
438:FISA Improvements Act
32:scientia est potentia
22:
2587:St. Petersburg Times
2541:on December 1, 2002.
2406:The National Journal
1930:on February 26, 2015
1802:on February 15, 2009
1678:. February 23, 2004.
471:Secure communication
313:Southern Cross Cable
2723:The Washington Post
2628:The Weekly Standard
2590:. January 24, 2003.
2524:. January 16, 2004.
2428:The Washington Post
2419:The Washington Post
2322:"You Are a Suspect"
1529:Scientific American
1039:evaluations run by
1037:machine translation
897:phone call database
507:Intelligence agency
323:Bad Aibling Station
171:Boundless Informant
56:Global surveillance
2458:The New York Times
2326:The New York Times
2300:The New York Times
2248:2008-05-17 at the
2196:2006-09-19 at the
2178:2006-07-15 at the
1953:2006-02-05 at the
1556:The New York Times
1253:The New York Times
1242:civil libertarians
1233:The New York Times
1155:
1096:
1019:
882:
797:
737:Iran-Contra Affair
696:September 11, 2001
672:
617:asymmetric threats
481:Call detail record
40:
36:knowledge is power
2750:Mass surveillance
2467:Academic articles
2460:. p. A00027.
2373:John Poindexter,
2270:Technology Review
2116:www.darpa.mil/iao
2093:on April 29, 2017
1385:on 2 August 2002.
1325:Mass surveillance
978:prediction market
929:Sean McGahan, of
859:NSA call database
644:mass surveillance
621:national security
597:
596:
461:Mass surveillance
407:Cybersecurity Law
2767:
2726:
2706:
2704:
2695:
2693:
2687:. Archived from
2682:
2665:
2660:. Archived from
2648:
2635:
2630:. Archived from
2611:
2609:
2608:
2591:
2577:
2565:
2563:
2562:
2553:. Archived from
2542:
2537:. Archived from
2525:
2506:
2500:
2490:
2461:
2449:
2448:. CNET News.com.
2440:
2437:The Boston Globe
2431:
2422:
2413:
2412:on May 17, 2008.
2408:. Archived from
2348:
2343:
2337:
2336:
2334:
2333:
2317:
2311:
2310:
2308:
2306:
2291:
2285:
2279:
2273:
2263:
2257:
2240:
2234:
2233:
2231:
2230:
2221:. Archived from
2211:
2200:
2188:
2182:
2170:
2164:
2163:
2161:
2160:
2151:. Archived from
2141:
2132:
2131:
2129:
2127:
2108:
2102:
2101:
2099:
2098:
2089:. Archived from
2078:
2069:
2068:
2066:
2065:
2056:. Archived from
2046:
2040:
2039:
2037:
2036:
2027:. Archived from
2017:
2011:
2010:
2008:
2007:
1998:. Archived from
1988:
1979:
1974:
1957:
1945:
1939:
1938:
1936:
1935:
1926:. Archived from
1915:
1906:
1905:
1885:
1879:
1878:
1876:
1875:
1866:. Archived from
1856:
1845:
1844:
1842:
1841:
1832:. Archived from
1822:
1811:
1810:
1808:
1807:
1798:. Archived from
1788:
1777:
1774:
1768:
1765:
1759:
1754:
1748:
1747:
1745:
1744:
1735:. Archived from
1729:
1723:
1718:
1712:
1711:
1709:
1707:
1691:
1680:
1679:
1668:
1659:
1658:
1656:
1655:
1646:. Archived from
1644:National Journal
1635:
1624:
1623:
1621:
1620:
1601:
1595:
1584:
1578:
1569:
1560:
1559:
1547:
1541:
1540:
1538:
1536:
1519:
1510:
1509:
1507:
1505:
1488:
1479:
1478:
1476:
1474:
1457:
1451:
1450:
1444:
1442:
1425:
1419:
1418:
1412:
1410:
1393:
1387:
1386:
1381:. Archived from
1371:
1356:Utah Data Center
1351:TALON (database)
1228:mainstream media
1171:natural language
1138:Bio-Surveillance
1133:Bio-Surveillance
1047:Genoa / Genoa II
944:
589:
582:
575:
556:Stop Watching Us
427:Proposed changes
318:Utah Data Center
67:
42:
41:
2775:
2774:
2770:
2769:
2768:
2766:
2765:
2764:
2730:
2729:
2702:
2698:
2691:
2680:
2645:National Review
2618:
2616:Proponent views
2606:
2604:
2580:
2568:
2560:
2558:
2545:
2516:
2513:
2498:
2469:
2421:. May 20, 2003.
2416:
2396:
2384:
2369:Wayback Machine
2356:
2354:Further reading
2351:
2346:Big Brother ...
2344:
2340:
2331:
2329:
2318:
2314:
2304:
2302:
2292:
2288:
2280:
2276:
2264:
2260:
2250:Wayback Machine
2241:
2237:
2228:
2226:
2213:
2212:
2203:
2198:Wayback Machine
2189:
2185:
2180:Wayback Machine
2171:
2167:
2158:
2156:
2143:
2142:
2135:
2125:
2123:
2110:
2109:
2105:
2096:
2094:
2079:
2072:
2063:
2061:
2048:
2047:
2043:
2034:
2032:
2019:
2018:
2014:
2005:
2003:
1990:
1989:
1982:
1975:
1960:
1955:Wayback Machine
1946:
1942:
1933:
1931:
1918:Ethier, Jason.
1916:
1909:
1902:
1886:
1882:
1873:
1871:
1858:
1857:
1848:
1839:
1837:
1824:
1823:
1814:
1805:
1803:
1790:
1789:
1780:
1775:
1771:
1766:
1762:
1755:
1751:
1742:
1740:
1731:
1730:
1726:
1719:
1715:
1705:
1703:
1692:
1683:
1670:
1669:
1662:
1653:
1651:
1650:on May 28, 2011
1636:
1627:
1618:
1616:
1603:
1602:
1598:
1585:
1581:
1570:
1563:
1548:
1544:
1534:
1532:
1520:
1513:
1503:
1501:
1489:
1482:
1472:
1470:
1458:
1454:
1440:
1438:
1426:
1422:
1408:
1406:
1394:
1390:
1373:
1372:
1368:
1364:
1265:
1224:
1187:
1147:
1135:
1119:
1088:
1073:
1049:
1011:
976:by researching
963:
957:
951:
945:
942:
917:
874:
848:
789:
774:
676:John Poindexter
664:
593:
466:Culture of fear
443:Other proposals
372:FISA amendments
367:USA Freedom Act
352:UKUSA Agreement
24:
17:
12:
11:
5:
2773:
2763:
2762:
2757:
2752:
2747:
2742:
2728:
2727:
2708:
2707:
2696:
2694:on 2007-09-26.
2667:
2666:
2649:
2636:
2617:
2614:
2613:
2612:
2592:
2578:
2566:
2543:
2535:Cato Institute
2526:
2512:
2511:Critical views
2509:
2508:
2507:
2491:
2468:
2465:
2464:
2463:
2450:
2441:
2432:
2423:
2414:
2402:"TIA Lives On"
2395:
2394:Media coverage
2392:
2391:
2390:
2383:
2382:External links
2380:
2379:
2378:
2371:
2355:
2352:
2350:
2349:
2338:
2312:
2286:
2274:
2258:
2235:
2215:"Communicator"
2201:
2183:
2165:
2133:
2122:on 28 May 2012
2103:
2070:
2041:
2012:
1980:
1958:
1940:
1907:
1900:
1880:
1846:
1812:
1778:
1769:
1760:
1749:
1724:
1713:
1681:
1660:
1640:"TIA Lives On"
1625:
1596:
1579:
1561:
1542:
1511:
1491:James Poulos.
1480:
1452:
1435:The New Yorker
1420:
1388:
1365:
1363:
1360:
1359:
1358:
1353:
1348:
1343:
1338:
1332:
1327:
1322:
1316:
1310:
1305:
1300:
1295:
1289:
1284:
1278:
1272:
1264:
1261:
1257:William Safire
1223:
1220:
1186:
1183:
1146:
1143:
1134:
1131:
1118:
1115:
1107:speech-to-text
1087:
1084:
1072:
1069:
1048:
1045:
1010:
1007:
953:Main article:
950:
947:
940:
916:
913:
873:
870:
847:
844:
843:
842:
835:
832:
829:
826:
821:Fuse face and
819:
788:
785:
773:
770:
663:
660:
652:Edward Snowden
633:search warrant
623:by achieving "
595:
594:
592:
591:
584:
577:
569:
566:
565:
564:
563:
558:
553:
548:
547:
546:
541:
531:
530:
529:
524:
519:
509:
504:
496:
495:
494:Related topics
491:
490:
489:
488:
483:
478:
473:
468:
463:
455:
454:
450:
449:
448:
447:
446:
445:
440:
429:
428:
424:
423:
422:
421:
420:
419:
411:
410:
409:
404:
396:
395:
394:
389:
384:
376:
375:
374:
369:
361:
360:
359:
354:
343:
342:
338:
337:
336:
335:
330:
328:Dagger Complex
325:
320:
315:
310:
305:
300:
295:
287:
286:
282:
281:
280:
279:
274:
269:
264:
259:
254:
249:
244:
239:
234:
229:
224:
216:
215:
211:
210:
209:
208:
203:
198:
193:
188:
183:
178:
173:
168:
163:
158:
153:
148:
143:
138:
133:
128:
123:
118:
113:
105:
104:
100:
99:
98:
97:
92:
87:
82:
74:
73:
69:
68:
60:
59:
51:
50:
15:
9:
6:
4:
3:
2:
2772:
2761:
2758:
2756:
2753:
2751:
2748:
2746:
2743:
2741:
2740:DARPA offices
2738:
2737:
2735:
2724:
2720:
2715:
2714:
2713:
2712:
2701:
2697:
2690:
2686:
2679:
2674:
2673:
2672:
2671:
2663:
2659:
2655:
2650:
2646:
2642:
2637:
2633:
2629:
2625:
2620:
2619:
2603:on 2002-12-28
2602:
2598:
2593:
2589:
2588:
2583:
2579:
2575:
2571:
2567:
2557:on 2007-09-15
2556:
2552:
2548:
2544:
2540:
2536:
2532:
2527:
2523:
2519:
2515:
2514:
2504:
2497:
2492:
2488:
2484:
2480:
2476:
2471:
2470:
2459:
2456:
2451:
2447:
2442:
2439:. p. C2.
2438:
2433:
2429:
2424:
2420:
2415:
2411:
2407:
2403:
2398:
2397:
2389:
2386:
2385:
2376:
2372:
2370:
2366:
2365:Archive index
2362:
2358:
2357:
2347:
2342:
2327:
2323:
2316:
2301:
2297:
2290:
2283:
2278:
2271:
2267:
2262:
2255:
2251:
2247:
2244:
2239:
2225:on 2009-02-15
2224:
2220:
2216:
2210:
2208:
2206:
2199:
2195:
2192:
2187:
2181:
2177:
2174:
2169:
2155:on 2009-05-07
2154:
2150:
2146:
2140:
2138:
2121:
2117:
2113:
2107:
2092:
2088:
2084:
2077:
2075:
2060:on 2009-02-15
2059:
2055:
2051:
2045:
2031:on 2009-02-16
2030:
2026:
2022:
2016:
2002:on 2009-02-15
2001:
1997:
1993:
1987:
1985:
1978:
1973:
1971:
1969:
1967:
1965:
1963:
1956:
1952:
1949:
1944:
1929:
1925:
1921:
1914:
1912:
1903:
1901:9783319172446
1897:
1893:
1892:
1884:
1870:on 2009-02-16
1869:
1865:
1861:
1855:
1853:
1851:
1836:on 2009-02-15
1835:
1831:
1827:
1821:
1819:
1817:
1801:
1797:
1793:
1787:
1785:
1783:
1773:
1764:
1758:
1753:
1739:on 2006-04-24
1738:
1734:
1728:
1722:
1717:
1701:
1697:
1690:
1688:
1686:
1677:
1673:
1667:
1665:
1649:
1645:
1641:
1634:
1632:
1630:
1615:on 2009-03-25
1614:
1610:
1606:
1600:
1593:
1592:0-8050-9303-6
1589:
1583:
1577:
1573:
1568:
1566:
1557:
1553:
1546:
1531:
1530:
1525:
1522:John Horgan.
1518:
1516:
1500:
1499:
1494:
1487:
1485:
1469:
1468:
1463:
1456:
1449:
1437:
1436:
1431:
1424:
1417:
1405:
1404:
1399:
1396:Tim Dowling.
1392:
1384:
1380:
1376:
1370:
1366:
1357:
1354:
1352:
1349:
1347:
1344:
1342:
1339:
1336:
1333:
1331:
1328:
1326:
1323:
1320:
1317:
1314:
1311:
1309:
1306:
1304:
1301:
1299:
1298:Fusion center
1296:
1293:
1290:
1288:
1285:
1282:
1279:
1276:
1273:
1270:
1267:
1266:
1260:
1258:
1254:
1249:
1247:
1243:
1239:
1235:
1234:
1229:
1219:
1217:
1212:
1209:
1203:
1201:
1197:
1191:
1182:
1180:
1175:
1172:
1167:
1162:
1159:
1151:
1142:
1139:
1130:
1128:
1123:
1114:
1111:
1108:
1104:
1100:
1092:
1083:
1081:
1077:
1068:
1066:
1061:
1060:
1055:
1054:
1044:
1042:
1038:
1034:
1029:
1027:
1023:
1015:
1006:
1004:
1000:
996:
991:
988:
984:
979:
975:
971:
967:
962:
956:
939:
934:
932:
927:
925:
921:
912:
910:
905:
901:
898:
893:
888:
886:
878:
869:
866:
862:
860:
856:
852:
840:
836:
833:
830:
827:
824:
820:
817:
816:
815:
812:
810:
806:
802:
793:
784:
781:
779:
778:context aware
769:
765:
762:
758:
753:
750:
745:
744:Russ Feingold
740:
738:
732:
729:
725:
721:
717:
714:
710:
709:
703:
699:
697:
693:
689:
685:
684:Ronald Reagan
682:to President
681:
677:
668:
659:
657:
653:
649:
645:
640:
638:
634:
628:
626:
622:
618:
614:
610:
606:
602:
590:
585:
583:
578:
576:
571:
570:
568:
567:
562:
559:
557:
554:
552:
549:
545:
542:
540:
537:
536:
535:
532:
528:
525:
523:
520:
518:
515:
514:
513:
510:
508:
505:
503:
500:
499:
498:
497:
493:
492:
487:
484:
482:
479:
477:
474:
472:
469:
467:
464:
462:
459:
458:
457:
456:
452:
451:
444:
441:
439:
436:
435:
433:
432:
431:
430:
426:
425:
418:
415:
414:
412:
408:
405:
403:
400:
399:
397:
393:
390:
388:
385:
383:
380:
379:
377:
373:
370:
368:
365:
364:
362:
358:
355:
353:
350:
349:
347:
346:
345:
344:
340:
339:
334:
331:
329:
326:
324:
321:
319:
316:
314:
311:
309:
306:
304:
301:
299:
296:
294:
291:
290:
289:
288:
284:
283:
278:
275:
273:
270:
268:
265:
263:
260:
258:
255:
253:
250:
248:
245:
243:
240:
238:
235:
233:
230:
228:
225:
223:
220:
219:
218:
217:
213:
212:
207:
204:
202:
199:
197:
194:
192:
189:
187:
184:
182:
179:
177:
174:
172:
169:
167:
164:
162:
159:
157:
154:
152:
149:
147:
144:
142:
139:
137:
134:
132:
129:
127:
124:
122:
119:
117:
114:
112:
109:
108:
107:
106:
102:
101:
96:
93:
91:
88:
86:
83:
81:
78:
77:
76:
75:
71:
70:
66:
62:
61:
58:
57:
53:
52:
48:
44:
43:
37:
33:
30:
29:
21:
2722:
2710:
2709:
2689:the original
2669:
2668:
2662:the original
2658:The Atlantic
2657:
2644:
2632:the original
2627:
2605:. Retrieved
2601:the original
2585:
2559:. Retrieved
2555:the original
2539:the original
2502:
2478:
2474:
2457:
2436:
2427:
2418:
2410:the original
2405:
2341:
2330:. Retrieved
2325:
2315:
2303:. Retrieved
2299:
2289:
2282:TIA Lives On
2277:
2269:
2261:
2253:
2238:
2227:. Retrieved
2223:the original
2218:
2186:
2168:
2157:. Retrieved
2153:the original
2148:
2124:. Retrieved
2120:the original
2115:
2106:
2095:. Retrieved
2091:the original
2086:
2062:. Retrieved
2058:the original
2053:
2044:
2033:. Retrieved
2029:the original
2024:
2015:
2004:. Retrieved
2000:the original
1995:
1943:
1932:. Retrieved
1928:the original
1923:
1890:
1883:
1872:. Retrieved
1868:the original
1863:
1838:. Retrieved
1834:the original
1829:
1804:. Retrieved
1800:the original
1795:
1772:
1763:
1752:
1741:. Retrieved
1737:the original
1727:
1716:
1704:. Retrieved
1699:
1675:
1652:. Retrieved
1648:the original
1643:
1617:. Retrieved
1613:the original
1608:
1599:
1582:
1575:
1555:
1545:
1533:. Retrieved
1527:
1502:. Retrieved
1496:
1471:. Retrieved
1465:
1455:
1446:
1439:. Retrieved
1433:
1423:
1414:
1407:. Retrieved
1403:The Guardian
1401:
1391:
1383:the original
1369:
1313:Intellipedia
1252:
1250:
1238:John Markoff
1231:
1225:
1213:
1204:
1198:(run by the
1192:
1188:
1176:
1165:
1163:
1158:Communicator
1157:
1156:
1145:Communicator
1137:
1136:
1121:
1120:
1112:
1102:
1098:
1097:
1079:
1075:
1074:
1057:
1051:
1050:
1030:
1025:
1021:
1020:
969:
965:
964:
943:Sean McGahan
936:
928:
919:
918:
909:privacy laws
906:
902:
889:
884:
883:
867:
863:
854:
850:
849:
813:
804:
800:
798:
782:
775:
766:
760:
754:
741:
733:
730:
726:
722:
718:
712:
706:
704:
700:
673:
641:
629:
613:surveillance
604:
600:
598:
534:Human rights
512:Cryptography
303:Menwith Hill
293:The Doughnut
90:2013–present
54:
35:
26:
2595:Russ Kick.
2328:. p. 2
1473:19 December
1441:30 November
1409:30 November
990:Tom Daschle
141:Stone Ghost
72:Disclosures
2734:Categories
2607:2002-12-19
2561:2016-12-04
2332:2010-10-21
2229:2009-03-15
2159:2009-03-15
2097:2009-03-15
2064:2009-03-15
2050:"Genoa II"
2035:2009-03-15
2006:2009-03-15
1934:2009-03-15
1874:2009-03-15
1840:2009-03-15
1806:2009-03-15
1743:2006-03-03
1676:Wired News
1654:2009-03-16
1619:2009-03-15
1535:19 October
1504:19 October
1362:References
1230:came from
1065:Deep Green
1003:Carl Levin
955:Future Map
551:Satellites
348:Five Eyes
298:Fort Meade
151:Frenchelon
1948:FutureMap
1860:"Genisys"
1706:4 January
1335:Pre-crime
1319:MALINTENT
1275:Carnivore
1246:Orwellian
1236:reporter
983:bookmaker
970:FutureMAP
809:biometric
761:Terrorism
749:Ron Wyden
713:Terrorism
678:, former
627:" (TIA).
502:Espionage
333:GCHQ Bude
257:Five Eyes
196:RAMPART-A
131:Carnivore
111:XKeyscore
95:Reactions
2505:: 18–26.
2254:Newsweek
2246:Archived
2194:Archived
2176:Archived
1951:Archived
1263:See also
1216:Genoa II
1059:Genoa II
941:—
892:database
772:Research
648:Congress
619:to U.S.
453:Concepts
308:Pine Gap
227:R&AW
214:Agencies
186:Stingray
156:Fairview
136:Dishfire
126:Sentient
85:Pre-2013
47:a series
45:Part of
25:(motto:
2670:Accord:
2367:at the
2173:Babylon
2126:16 June
2021:"Genoa"
1992:"TIDES"
1448:power."
1292:ECHELON
1166:context
1122:Babylon
1117:Babylon
1001:, Sen.
885:Genisys
872:Genisys
805:HumanID
662:History
544:Liberty
539:Privacy
181:Pinwale
176:Bullrun
146:Tempora
121:ECHELON
103:Systems
80:Origins
2487:546782
2485:
2305:May 5,
2145:"EARS"
1898:
1700:Spying
1590:
1498:Forbes
1416:Earth.
1269:ADVISE
1127:triage
995:Oregon
686:, and
476:SIGINT
398:China
357:Lustre
285:Places
277:Mossad
161:MYSTIC
2711:Also:
2703:(PDF)
2692:(PDF)
2681:(PDF)
2499:(PDF)
1379:DARPA
1053:Genoa
1026:TIDES
1009:TIDES
757:DARPA
434:U.S.
363:U.S.
116:PRISM
2483:SSRN
2307:2010
2128:2016
1896:ISBN
1708:2014
1588:ISBN
1537:2013
1506:2013
1475:2013
1443:2013
1411:2013
1208:SAIC
1103:EARS
1056:and
1041:NIST
855:EELD
823:gait
799:The
688:SAIC
599:The
522:VPNs
392:GDPR
341:Laws
272:GCHQ
252:DGSE
247:ASIO
191:SORM
166:DCSN
28:lat.
2191:BSS
1977:CNN
1080:WAE
605:IAO
527:TLS
517:Tor
413:UK
378:EU
267:MSS
262:FSB
242:CNI
237:BND
232:CSE
222:NSA
2736::
2721:.
2683:.
2656:.
2643:.
2626:.
2584:.
2572:.
2549:.
2533:.
2520:.
2501:.
2477:.
2404:.
2324:.
2298:.
2268:,
2252:,
2217:.
2204:^
2147:.
2136:^
2114:.
2085:.
2073:^
2052:.
2023:.
1994:.
1983:^
1961:^
1922:.
1910:^
1862:.
1849:^
1828:.
1815:^
1794:.
1781:^
1698:.
1684:^
1674:.
1663:^
1642:.
1628:^
1607:.
1574:,
1564:^
1554:.
1526:.
1514:^
1495:.
1483:^
1464:.
1445:.
1432:.
1413:.
1400:.
1377:.
1129:.
1043:.
698:.
658:.
49:on
34:–
2647:.
2610:.
2576:.
2564:.
2489:.
2479:5
2430:.
2335:.
2309:.
2232:.
2162:.
2130:.
2100:.
2067:.
2038:.
2009:.
1937:.
1904:.
1877:.
1843:.
1809:.
1746:.
1710:.
1657:.
1622:.
1558:.
1539:.
1508:.
1477:.
1101:(
1078:(
1024:(
968:(
853:(
841:.
803:(
603:(
588:e
581:t
574:v
38:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.