Knowledge

Information Awareness Office

Source 📝

1150: 667: 792: 65: 20: 877: 1014: 1091: 752:
privacy and civil liberties or the President certified the program's research as vital to national security interests. In February 2003, Congress passed legislation suspending activities of the IAO pending a Congressional report of the office's activities (Consolidated Appropriations Resolution, 2003, No.108–7, Division M, §111(b) ).
1062:
focused on providing advanced decision-support and collaboration tools to rapidly deal with and adjust to dynamic crisis management and allow for inter-agency collaboration in real-time. Another function was to be able to make estimates of possible future scenarios to assist intelligence officials in
719:
The TIA program itself was the "systems-level" program of the IAO that intended to integrate information technologies into a prototype system to provide tools to better detect, classify, and identify potential terrorists with the goal to increase the probability that authorized agencies of the United
1173:
speech, which is much more complex due to an essentially unlimited vocabulary and grammar, the Communicator program is directed task specific issues so that there are constrained vocabularies (the system only needs to be able to understand language related to war). Research was also started to focus
980:
techniques for avoiding surprise and predicting future events. The intent was to explore the feasibility of market-based trading mechanisms to predict political instability, threats to national security, and other major events in the near future. In layman's terms, FutureMap would be a website that
723:
As a systems-level program of programs, TIA's goal was the creation of a "counter-terrorism information architecture" that integrated technologies from other IAO programs (and elsewhere, as appropriate). The TIA program was researching, developing, and integrating technologies to virtually aggregate
1109:
transcription technology whose output is substantially richer and much more accurate than previously possible. The aim of EARS was to focus on everyday human-to-human speech from broadcasts and telephone conversations in multiple languages. It is expected to increase the speed with which speech can
992:
said on the floor of the Senate "I couldn't believe that we would actually commit $ 8 million to create a Web site that would encourage investors to bet on futures involving terrorist attacks and public assassinations. ... I can't believe that anybody would seriously propose that we trade in death.
899:
and a foreign intelligence database. The World Wide Web is considered an "unstructured public data source" because it is publicly accessible and contains many different types of data—such as blogs, emails, records of visits to web sites, etc.—all of which need to be analyzed and stored efficiently.
864:
EELD was designed to design systems with the ability to extract data from multiple sources (e.g., text messages, social networking sites, financial records, and web pages). It was to develop the ability to detect patterns comprising multiple types of links between data items or people communicating
763:
Information Awareness Program and emphasized that the program was not designed to compile dossiers on US citizens, but rather to research and develop the tools that would allow authorized agencies to gather information on terrorist networks. Despite the name change and these assurances, the critics
715:
Information Awareness Program in May that year after an adverse media reaction to the program's implications for public surveillance. Although TIA was only one of several IAO projects, many critics and news reports conflated TIA with other related research projects of the IAO, with the result that
1189:
Despite the withdrawal of funding for the TIA and the closing of the IAO, the core of the project survived. Legislators included a classified annex to the Defense Appropriations Act that preserved funding for TIA's component technologies, if they were transferred to other government agencies. TIA
894:
technology at the time was insufficient for storing and organizing such enormous quantities of data. So they developed techniques for virtual data aggregation in order to support effective analysis across heterogeneous databases, as well as unstructured public data sources, such as the World Wide
751:
would have prohibited the IAO from operating within the United States unless specifically authorized to do so by Congress, and would have shut the IAO down entirely 60 days after passage unless either the Pentagon prepared a report to Congress assessing the impact of IAO activities on individual
1168:
of the dialogue in order to improve performance, and to be capable of automatically adapting to new topics (because situations quickly change in war) so conversation is natural and efficient. The Communicator program emphasized task knowledge to compensate for natural language effects and noisy
937:
The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people
767:
As a result, House and Senate negotiators moved to prohibit further funding for the TIA program by adding provisions to the Department of Defense Appropriations Act, 2004 (signed into law by President Bush on October 1, 2003). Further, the Joint Explanatory Statement included in the conference
1160:
was to develop "dialogue interaction" technology that enables warfighters to talk with computers, such that information will be accessible on the battlefield or in command centers without ever having to touch a keyboard. The Communicator Platform was to be both wireless and mobile, and to be
630:
It was achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a
903:
Another goal was to develop "a large, distributed system architecture for managing the huge volume of raw data input, analysis results, and feedback, that will result in a simpler, more flexible data store that performs well and allows us to retain important data indefinitely."
1447:
The Information Awareness Office's official seal features an occult pyramid topped with mystic all-seeing eye, like the one on the dollar bill. Its official motto is "Scientia Est Potentia," which doesn't mean "science has a lot of potential." It means "knowledge is
727:
Among the other IAO programs that were intended to provide TIA with component data aggregation and automated analysis technologies were the Genisys, Genisys Privacy Protection, Evidence Extraction and Link Discovery, and Scalable Social Network Analysis programs.
1082:) focused on developing automated technology capable of identifying predictive indicators of terrorist activity or impending attacks by examining individual and group behavior in broad environmental context and examining the motivation of specific terrorists. 1190:
projects continued to be funded under classified annexes to Defense and Intelligence appropriation bills. However, the act also stipulated that the technologies be used only for military or foreign intelligence purposes involving foreigners.
1193:
TIA's two core projects are now operated by Advanced Research and Development Activity (ARDA) located among the 60-odd buildings of "Crypto City" at NSA headquarters in Fort Meade, MD. ARDA itself has been shifted from the NSA to the
734:
In addition to the program itself, the involvement of Poindexter as director of the IAO also raised concerns among some, since he had been earlier convicted of lying to Congress and altering and destroying documents pertaining to the
1205:
One technology, codenamed "Basketball", is the Information Awareness Prototype System, the core architecture to integrate all the TIA's information extraction, analysis, and dissemination tools. Work on this project is conducted by
1124:
aimed to develop rapid, two-way, natural language speech translation interfaces and platforms. Its goal was to help the warfighter in field environments to complete tasks such as force protection, refugee processing, and medical
724:
data, to follow subject-oriented link analysis, to develop descriptive and predictive models through data mining or human hypothesis, and to apply such models to additional datasets to identify terrorists and terrorist groups.
1210:
through its former Hicks & Associates consulting arm, and run by former Defense and military officials and which had originally been awarded US$ 19 million IAO contract to build the prototype system in late 2002.
938:
around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
701:
Poindexter and Hicks had previously worked together on intelligence-technology programs for the Defense Advanced Research Projects Agency. DARPA agreed to host the program and appointed Poindexter to run it in 2002.
1140:
aimed to develop the necessary information technologies and resulting prototype capable of detecting the covert release of a biological pathogen automatically, and significantly earlier than traditional approaches.
857:) developed technologies and tools for automated discovery, extraction and linking of sparse evidence contained in large amounts of classified and unclassified data sources (such as phone call records from the 1415:
The Prism logo is slightly more opaque than the one used by the US government's Information Awareness Office, which boasted an all-seeing eye atop a pyramid, casting a golden light across an adjacent planet
895:
Web. "Effective analysis across heterogenous databases" means the ability to take things from databases which are designed to store different types of data—such as a database containing criminal records, a
746:
introduced legislation to suspend the activity of the IAO and the Total Information Awareness program pending a Congressional review of privacy issues involved. A similar measure introduced by Senator
1028:) developed advanced language processing technology to enable English speakers to find and interpret critical information in multiple languages without requiring knowledge of those languages. 868:
It is designed to link items relating potential "terrorist" groups and scenarios, and to learn patterns of different groups or scenarios to identify new organizations and emerging threats.
1492: 371: 1259:
in which he claimed " has been given a $ 200 million budget to create computer dossiers on 300 million Americans." Safire has been credited with triggering the anti-TIA movement.
1113:
The intent is to create a core enabling technology (technology that is used as a component for future technologies) suitable for a wide range of future surveillance applications.
1218:) and would provide IT tools to help anticipate and preempt terrorist attacks. SAIC has also been contracted to work on Topsail, including a US$ 3.7 million contract in 2005. 811:
identification technologies to detect, recognize and identify humans at great distances for "force protection", crime prevention, and "homeland security/defense" purposes.
1240:
on February 13, 2002. Initial reports contained few details about the program. In the following months, as more information emerged about the scope of the TIA project,
442: 1594:"Congress's action did not end the Total Information Awareness program. The National Security Agency secretly decided to continue it through its private contractors." 1523: 907:
Genisys had an internal "Privacy Protection Program." It was intended to restrict analysts' access to irrelevant information on private U.S. citizens, enforce
406: 731:
On August 2, 2002, Poindexter gave a speech at DARPAtech 2002 entitled "Overview of the Information Awareness Office" in which he described the TIA program.
1551: 776:
IAO research was conducted along five major investigative paths: secure collaboration problem solving; structured discovery; link and group understanding;
2744: 1345: 2623: 2754: 1286: 635:. The information was then analyzed for suspicious activities, connections between individuals, and "threats". The program also included funding for 998: 997:, Ron Wyden said, "The idea of a federal betting parlor on atrocities and terrorism is ridiculous and it's grotesque." The ranking Democrat on the 1005:
of Michigan, thought the program was so ridiculous that he thought initial reports of it were the result of a hoax. The program was then dropped.
2377:(Remarks as prepared for delivery by John Poindexter, Director, Information Awareness Office, at the DARPATech 2002 Conference) (August 2, 2002). 1094:
Graphic from the Information Awareness Office's website describing the goals of the Effective, Affordable, Reusable Speech-to-Text (EARS) project
84: 2401: 2245: 1329: 1207: 687: 586: 246: 1919: 670:
Diagram of Total Information Awareness system, taken from official (decommissioned) Information Awareness Office website (click to enlarge)
94: 2653: 2345: 2759: 2214: 993:... How long would it be before you saw traders investing in a way that would bring about the desired result?" Democratic Senator from 986: 608: 251: 2530: 1950: 2596: 1732: 1307: 2546: 2175: 2049: 1859: 1639: 1604: 679: 125: 2677: 2454: 2020: 1991: 2144: 1825: 831:
Develop a low power millimeter wave radar system for wide field of view detection and narrow field of view gait classification.
759:
provided Congress on May 20, 2003 with a report on its activities. In this report, IAO changed the name of the program to the
2193: 2111: 2082: 1791: 926:
for modeling the key characteristics of terrorist groups and discriminating these groups from other types of societal groups.
2573: 231: 89: 241: 828:
Develop and demonstrate a human identification system that operates out to 150 meters (500 ft) using visible imagery.
485: 2387: 655: 391: 266: 205: 2295: 795:
Diagram (from official IAO site) describing capabilities of the "Human Identification at a Distance (HumanID)" project
1899: 1591: 1199: 739:, although those convictions were later overturned on the grounds that the testimony used against him was protected. 579: 165: 1397: 1315:, a collection of wikis used by the U.S. intelligence community to "connect the dots" between pieces of intelligence 1302: 312: 985:
would have been the federal government. Several Senators were outraged at the very notion of such a program. Then
2631: 155: 1202:). They are funded by National Foreign Intelligence Program for foreign counterterrorism intelligence purposes. 2550: 2521: 79: 1461: 416: 160: 2684: 1340: 1195: 572: 236: 175: 46: 768:
committee report specifically directed that the IAO as program manager for TIA be terminated immediately.
1756: 1170: 707: 624: 2581: 887:
aimed at developing technologies which would enable "ultra-large, all-source information repositories".
2749: 2718: 2360: 1767:
Department of Defense Appropriations Act, 2004, Pub. L. No. 108–87, § 8131, 117 Stat. 1054, 1102 (2003)
226: 2473:
K. A. Taipale (2003). "Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data".
1493:"Obama Administration Anti-Leak Scheme Shows Precrime and Total Information Awareness Go Hand In Hand" 1429: 1374: 1149: 2242: 838: 639:
technologies that could identify and track individuals using surveillance cameras and other methods.
401: 386: 2321: 1695: 1031:
Outside groups (such as universities, corporations, etc.) were invited to participate in the annual
650:
in 2003. However, several IAO projects continued to be funded under different names, as revealed by
691: 560: 550: 526: 381: 261: 221: 2495: 973: 930: 923: 521: 2640: 1976: 1927: 818:
Develop algorithms for locating and acquiring subjects out to 150 meters (500 ft) in range.
666: 2739: 2661: 2641:"Total Preparedness: The case for the Defense Department's Total Information Awareness project" 1283:, or CTS, a project to link up all security cameras citywide and "track everything that moves". 960: 647: 200: 185: 2486: 1466: 1280: 1178: 1032: 1017:
Goals of the Translingual Information Detection, Extraction and Summarization (TIDES) project
437: 31: 2699: 2547:"Total/Terrorism Information Awareness (TIA): Is It Truly Dead? EFF: It's Too Early to Tell" 2517: 2222: 642:
Following public criticism that the technology's development and deployment could lead to a
2586: 475: 470: 130: 2364: 8: 2538: 1947: 1528: 1036: 506: 322: 170: 55: 2600: 2554: 1736: 1671: 2409: 2281: 2172: 2057: 1867: 1647: 1612: 1232: 890:
Vast amounts of information were going to be collected and analyzed, and the available
736: 616: 480: 1177:
Live exercises were conducted involving small unit logistics operations involving the
1153:
Diagram (from official IAO site) describing capabilities of the "Communicator" project
2688: 2482: 2028: 1999: 1895: 1587: 1324: 1241: 1174:
on foreign language computer interaction for use in supporting coalition operations.
1067:
program which is designed to assist Army commanders in making battlefield decisions.
977: 896: 858: 777: 643: 636: 620: 611:(DARPA) in January 2002 to bring together several DARPA projects focused on applying 460: 2152: 1833: 2435:
Bray, Hiawatha (April 4, 2003). "Mining Data to Fight Terror Stirs Privacy Fears".
2190: 2119: 1799: 1355: 1350: 1227: 1058: 555: 538: 317: 302: 2265: 2090: 2374: 2368: 2249: 2197: 2179: 1954: 1889: 1720: 1274: 675: 543: 465: 366: 356: 351: 1552:"Pentagon Plans a Computer System That Would Peek at Personal Data of Americans" 834:
Characterize gait performance from video for human identification at a distance.
2534: 1434: 1256: 1244:
became concerned over what they saw as the potential for the development of an
1106: 651: 632: 327: 2569: 2496:"Countering Terrorism through Information and Privacy Protection Technologies" 2733: 2445: 1297: 1052: 743: 683: 516: 1402: 1312: 1237: 1184: 612: 533: 511: 292: 1571: 989: 908: 791: 716:
TIA came in popular usage to stand for an entire subset of IAO programs.
140: 1271:, full population data mining & analysis to "monitor social threats" 694:
with the idea for an information awareness program after the attacks of
1064: 1002: 954: 297: 150: 1524:"U.S. Never Really Ended Creepy "Total Information Awareness" Program" 1085: 1586:
Dismantling the Empire: America's Last Best Hope By Chalmers Johnson
1334: 1318: 1245: 982: 808: 748: 615:
and information technology to track and monitor terrorists and other
501: 332: 256: 195: 110: 2725:. pp. A19 (discussing opposition to the IAO FutureMap project). 2705:. DOD Technology and Privacy Advisory Committee (TAPAC). March 2004. 2361:
https://web.archive.org/web/20021123234437/http://www.darpa.mil/iao/
948: 1924:
Northeastern University College of Computer and Information Science
1215: 891: 764:
continued to see the system as prone to potential misuse or abuse.
307: 135: 16:
DARPA division overseeing the "Total Information Awareness" program
2675: 1035:, topic detection and tracking, automatic content extraction, and 981:
allowed people to bet on when a terrorist attack would occur. The
2531:"TIA: Information Awareness Office Makes Us a Nation of Suspects" 1291: 911:
and policies via software mechanisms, and report misuse of data.
180: 145: 120: 64: 1605:"Total/Terrorism Information Awareness (TIA): Is It Truly Dead?" 1022:
Translingual Information Detection, Extraction and Summarization
2493: 1891:
Counterterrorism and Cybersecurity: Total Information Awareness
1497: 1268: 1126: 994: 786: 276: 865:(e.g., financial transactions, communications, travel, etc.). 1378: 1214:
The other project has been re-designated "Topsail" (formerly
1070: 756: 115: 27: 2570:"Total 'Terrorism' Information Awareness (TIA): Latest News" 2284:, National Journal, 23 February 2006, retrieved 27 July 2007 1382: 2426:
Webb, Cynthia L. (May 21, 2003). "The Pentagon's PR Play".
2359:
Copies of the original IAO web pages formerly available at
1894:(2, illustrated, revised ed.). Springer. p. 141. 1040: 822: 711:(TIA) Program in February 2003 but renamed the program the 695: 271: 190: 19: 2494:
Robert Popp and John Poindexter (November–December 2006).
876: 780:
visualization; and decision making with corporate memory.
2149:
Information Awareness Office (official website -- mirror)
1996:
Information Awareness Office (official website -- mirror)
1830:
Information Awareness Office (official website -- mirror)
1796:
Information Awareness Office (official website -- mirror)
845: 1185:
Components of TIA projects that continue to be developed
1063:
deciding what to do, in a manner similar to the DARPA's
1013: 2597:"Information Awareness Office Website Deletes Its Logo" 2209: 2207: 2205: 1164:
The dialogue interaction software was to interpret the
1090: 2455:"Chief Takes Over at Agency to Thwart Attacks on U.S." 705:
The IAO began funding research and development of the
2700:"Safeguarding Privacy in the Fight Against Terrorism" 2296:"Chief Takes Over at Agency To Thwart Attacks on U.S" 1666: 1664: 2202: 825:
recognition into a 24/7 human identification system.
2076: 2074: 1486: 1484: 1086:
Effective Affordable Reusable Speech-to-text (EARS)
914: 2678:"Using Technology to Detect and Prevent Terrorism" 1854: 1852: 1850: 1786: 1784: 1782: 1661: 1346:Synthetic Environment for Analysis and Simulations 2654:"Big Brother and Another Overblown Privacy Scare" 1609:Electronic Frontier Foundation (official website) 1427: 1287:Communications Assistance For Law Enforcement Act 1161:designed to function in a networked environment. 949:Futures Markets Applied to Prediction (FutureMAP) 2731: 2266:The Total Information Awareness Project Lives On 2071: 1986: 1984: 1972: 1970: 1968: 1966: 1964: 1962: 1481: 1181:to test the technology in extreme environments. 1110:be processed by computers by 100 times or more. 2528: 2363:(June 12, 2002 – June 3, 2003) can be found at 2219:Information Awareness Office (official website) 2139: 2137: 2054:Information Awareness Office (official website) 2025:Information Awareness Office (official website) 1864:Information Awareness Office (official website) 1847: 1820: 1818: 1816: 1779: 1733:"Search Results - THOMAS (Library of Congress)" 1633: 1631: 1629: 1597: 1567: 1565: 1459: 1221: 2118:. Information Awareness Office. Archived from 2042: 1776:149 Cong. Rec. H8755—H8771 (24 September 2003) 1543: 1330:Multistate Anti-Terrorism Information Exchange 1169:environments. Unlike automated translation of 837:Develop a multi-spectral infrared and visible 2472: 2013: 1981: 1959: 580: 2375:Overview of the Information Awareness Office 2134: 2112:"Wargaming the Asymmetric Environment (WAE)" 1813: 1721:Overview of the Information Awareness Office 1626: 1576:Electronic Privacy Information Center (EPIC) 1562: 1549: 1294:, NSA worldwide digital interception program 1099:Effective Affordable Reusable Speech-to-text 787:Human Identification at a Distance (HumanID) 2676:Shane Ham & Robert D. Atkinson (2002). 1920:"Current Research in Social Network Theory" 2621: 2582:"A Times Editorial: Unfocused data-mining" 2446:"Pentagon database plan hits snag on Hill" 1517: 1515: 1071:Wargaming the Asymmetric Environment (WAE) 587: 573: 2745:Government databases in the United States 2443: 2417:"Pentagon Defends Surveillance Program". 2256:, 8 February 2006, retrieved 27 July 2007 1913: 1911: 933:said the following in his study of SSNA: 609:Defense Advanced Research Projects Agency 2755:2002 establishments in the United States 2716: 2652:Taylor, Stuart Jr. (December 10, 2002). 2622:Mac Donald, Heather (January 27, 2003). 1826:"Evidence Extraction and Link Discovery" 1490: 1308:Information Processing Technology Office 1148: 1089: 1012: 922:aimed at developing techniques based on 875: 861:, internet histories, or bank records). 790: 665: 18: 2452: 2293: 2272:, 26 April 2006, retrieved 27 July 2007 2083:"EFF: Memorandum Regarding TIA Funding" 2080: 1521: 1512: 1395: 920:Scalable Social Network Analysis (SSNA) 680:United States National Security Advisor 607:) was established by the United States 2732: 2651: 2462:First mainstream media mention of IAO. 2444:McCullagh, Declan (January 15, 2003). 2399: 2319: 1908: 1757:The Global Information Society Project 1693: 1689: 1687: 1685: 1637: 1428:Hendrik Hertzberg (December 9, 2002). 851:Evidence Extraction and Link Discovery 846:Evidence Extraction and Link Discovery 720:States could preempt adverse actions. 674:The IAO was established after Admiral 2639:Levin, Jonathan (February 13, 2003). 2638: 2594: 2574:Electronic Privacy Information Center 2529:Charles V. Peña (November 22, 2002). 1460:Jonathan Turley (November 17, 2002). 1277:, FBI US digital interception program 966:Futures Markets Applied to Prediction 690:executive Brian Hicks approached the 2475:Columbia Sci. & Tech. Law Review 2466: 2434: 2425: 1792:"Human Identification at a distance" 1226:The first mention of the IAO in the 1076:Wargaming the Asymmetric Environment 2453:Markoff, John (February 13, 2002). 2400:Harris, Shane (February 26, 2006). 2294:Markoff, John (February 13, 2002). 1887: 1881: 1682: 1132: 1046: 486:Surveillance issues in smart cities 13: 2717:Ignatius, David (August 1, 2003). 2615: 2518:"TIA: Total Information Awareness" 2353: 1917: 1550:John Markoff (November 22, 2002). 801:Human Identification at a Distance 656:2013 mass surveillance disclosures 206:Jindalee Operational Radar Network 23:Information Awareness Office seal 14: 2771: 2760:Organizations established in 2002 2599:. The Memory Hole. Archived from 2510: 2481:(2): 1–83 (TIA discussed 39–50). 2393: 2381: 2081:Belasco, Amy (January 21, 2003). 1572:Total Information Awareness (TIA) 1200:Director of National Intelligence 755:In response to this legislation, 1398:"What does the Prism logo mean?" 1303:Government Information Awareness 915:Scalable Social Network Analysis 814:Its goals included programs to: 646:system, the IAO was defunded by 63: 2339: 2313: 2287: 2275: 2259: 2236: 2184: 2166: 2104: 1941: 1770: 1761: 1750: 1725: 1714: 1672:"U.S. Still Mining Terror Data" 1144: 2551:Electronic Frontier Foundation 2522:American Civil Liberties Union 2320:Safire, William (2002-11-14). 2243:Wanted: Competent Big Brothers 2087:Electronic Frontier Foundation 1638:Harris, Shane (Feb 23, 2006). 1580: 1453: 1421: 1389: 1375:"Information Awareness Office" 1367: 807:) project developed automated 1: 1694:Lundin, Leigh (7 July 2013). 1361: 783:Among the IAO projects were: 742:On January 16, 2003, Senator 417:Investigatory Powers Act 2016 2685:Progressive Policy Institute 2388:Information Awareness Office 1888:Lee, Newton (7 April 2015). 1696:"Pam, Prism, and Poindexter" 1341:PRISM (surveillance program) 1222:Media coverage and criticism 1196:Disruptive Technology Office 880:Goals of the Genysis project 601:Information Awareness Office 7: 2503:IEEE Security & Privacy 1462:"George Bush's Big Brother" 1321:—similar program to HumanID 1262: 771: 708:Total Information Awareness 625:Total Information Awareness 10: 2776: 1702:. Washington: SleuthSayers 1248:mass surveillance system. 1116: 972:) was intended to harness 958: 952: 871: 661: 2624:"Total Misrepresentation" 839:facial recognition system 654:during the course of the 402:National Intelligence Law 387:Data Protection Directive 1008: 999:Armed Services Committee 692:US Department of Defense 561:Nothing to hide argument 382:Data Retention Directive 2719:"Back in the Safe Zone" 974:collective intelligence 931:Northeastern University 924:social network analysis 1611:. 2003. Archived from 1430:"Too Much Information" 1337:concept in criminology 1255:published a column by 1251:On November 14, 2002, 1154: 1105:) developed automatic 1095: 1018: 987:Senate Minority Leader 961:Policy Analysis Market 946: 881: 796: 671: 637:biometric surveillance 201:Mastering the Internet 39: 2664:on December 26, 2002. 2634:on February 10, 2013. 1467:The Los Angeles Times 1281:Combat Zones That See 1179:United States Marines 1152: 1093: 1033:information retrieval 1016: 959:Further information: 935: 879: 794: 669: 438:FISA Improvements Act 32:scientia est potentia 22: 2587:St. Petersburg Times 2541:on December 1, 2002. 2406:The National Journal 1930:on February 26, 2015 1802:on February 15, 2009 1678:. February 23, 2004. 471:Secure communication 313:Southern Cross Cable 2723:The Washington Post 2628:The Weekly Standard 2590:. January 24, 2003. 2524:. January 16, 2004. 2428:The Washington Post 2419:The Washington Post 2322:"You Are a Suspect" 1529:Scientific American 1039:evaluations run by 1037:machine translation 897:phone call database 507:Intelligence agency 323:Bad Aibling Station 171:Boundless Informant 56:Global surveillance 2458:The New York Times 2326:The New York Times 2300:The New York Times 2248:2008-05-17 at the 2196:2006-09-19 at the 2178:2006-07-15 at the 1953:2006-02-05 at the 1556:The New York Times 1253:The New York Times 1242:civil libertarians 1233:The New York Times 1155: 1096: 1019: 882: 797: 737:Iran-Contra Affair 696:September 11, 2001 672: 617:asymmetric threats 481:Call detail record 40: 36:knowledge is power 2750:Mass surveillance 2467:Academic articles 2460:. p. A00027. 2373:John Poindexter, 2270:Technology Review 2116:www.darpa.mil/iao 2093:on April 29, 2017 1385:on 2 August 2002. 1325:Mass surveillance 978:prediction market 929:Sean McGahan, of 859:NSA call database 644:mass surveillance 621:national security 597: 596: 461:Mass surveillance 407:Cybersecurity Law 2767: 2726: 2706: 2704: 2695: 2693: 2687:. Archived from 2682: 2665: 2660:. Archived from 2648: 2635: 2630:. Archived from 2611: 2609: 2608: 2591: 2577: 2565: 2563: 2562: 2553:. Archived from 2542: 2537:. Archived from 2525: 2506: 2500: 2490: 2461: 2449: 2448:. CNET News.com. 2440: 2437:The Boston Globe 2431: 2422: 2413: 2412:on May 17, 2008. 2408:. Archived from 2348: 2343: 2337: 2336: 2334: 2333: 2317: 2311: 2310: 2308: 2306: 2291: 2285: 2279: 2273: 2263: 2257: 2240: 2234: 2233: 2231: 2230: 2221:. Archived from 2211: 2200: 2188: 2182: 2170: 2164: 2163: 2161: 2160: 2151:. Archived from 2141: 2132: 2131: 2129: 2127: 2108: 2102: 2101: 2099: 2098: 2089:. Archived from 2078: 2069: 2068: 2066: 2065: 2056:. Archived from 2046: 2040: 2039: 2037: 2036: 2027:. Archived from 2017: 2011: 2010: 2008: 2007: 1998:. Archived from 1988: 1979: 1974: 1957: 1945: 1939: 1938: 1936: 1935: 1926:. Archived from 1915: 1906: 1905: 1885: 1879: 1878: 1876: 1875: 1866:. Archived from 1856: 1845: 1844: 1842: 1841: 1832:. Archived from 1822: 1811: 1810: 1808: 1807: 1798:. Archived from 1788: 1777: 1774: 1768: 1765: 1759: 1754: 1748: 1747: 1745: 1744: 1735:. Archived from 1729: 1723: 1718: 1712: 1711: 1709: 1707: 1691: 1680: 1679: 1668: 1659: 1658: 1656: 1655: 1646:. Archived from 1644:National Journal 1635: 1624: 1623: 1621: 1620: 1601: 1595: 1584: 1578: 1569: 1560: 1559: 1547: 1541: 1540: 1538: 1536: 1519: 1510: 1509: 1507: 1505: 1488: 1479: 1478: 1476: 1474: 1457: 1451: 1450: 1444: 1442: 1425: 1419: 1418: 1412: 1410: 1393: 1387: 1386: 1381:. Archived from 1371: 1356:Utah Data Center 1351:TALON (database) 1228:mainstream media 1171:natural language 1138:Bio-Surveillance 1133:Bio-Surveillance 1047:Genoa / Genoa II 944: 589: 582: 575: 556:Stop Watching Us 427:Proposed changes 318:Utah Data Center 67: 42: 41: 2775: 2774: 2770: 2769: 2768: 2766: 2765: 2764: 2730: 2729: 2702: 2698: 2691: 2680: 2645:National Review 2618: 2616:Proponent views 2606: 2604: 2580: 2568: 2560: 2558: 2545: 2516: 2513: 2498: 2469: 2421:. May 20, 2003. 2416: 2396: 2384: 2369:Wayback Machine 2356: 2354:Further reading 2351: 2346:Big Brother ... 2344: 2340: 2331: 2329: 2318: 2314: 2304: 2302: 2292: 2288: 2280: 2276: 2264: 2260: 2250:Wayback Machine 2241: 2237: 2228: 2226: 2213: 2212: 2203: 2198:Wayback Machine 2189: 2185: 2180:Wayback Machine 2171: 2167: 2158: 2156: 2143: 2142: 2135: 2125: 2123: 2110: 2109: 2105: 2096: 2094: 2079: 2072: 2063: 2061: 2048: 2047: 2043: 2034: 2032: 2019: 2018: 2014: 2005: 2003: 1990: 1989: 1982: 1975: 1960: 1955:Wayback Machine 1946: 1942: 1933: 1931: 1918:Ethier, Jason. 1916: 1909: 1902: 1886: 1882: 1873: 1871: 1858: 1857: 1848: 1839: 1837: 1824: 1823: 1814: 1805: 1803: 1790: 1789: 1780: 1775: 1771: 1766: 1762: 1755: 1751: 1742: 1740: 1731: 1730: 1726: 1719: 1715: 1705: 1703: 1692: 1683: 1670: 1669: 1662: 1653: 1651: 1650:on May 28, 2011 1636: 1627: 1618: 1616: 1603: 1602: 1598: 1585: 1581: 1570: 1563: 1548: 1544: 1534: 1532: 1520: 1513: 1503: 1501: 1489: 1482: 1472: 1470: 1458: 1454: 1440: 1438: 1426: 1422: 1408: 1406: 1394: 1390: 1373: 1372: 1368: 1364: 1265: 1224: 1187: 1147: 1135: 1119: 1088: 1073: 1049: 1011: 976:by researching 963: 957: 951: 945: 942: 917: 874: 848: 789: 774: 676:John Poindexter 664: 593: 466:Culture of fear 443:Other proposals 372:FISA amendments 367:USA Freedom Act 352:UKUSA Agreement 24: 17: 12: 11: 5: 2773: 2763: 2762: 2757: 2752: 2747: 2742: 2728: 2727: 2708: 2707: 2696: 2694:on 2007-09-26. 2667: 2666: 2649: 2636: 2617: 2614: 2613: 2612: 2592: 2578: 2566: 2543: 2535:Cato Institute 2526: 2512: 2511:Critical views 2509: 2508: 2507: 2491: 2468: 2465: 2464: 2463: 2450: 2441: 2432: 2423: 2414: 2402:"TIA Lives On" 2395: 2394:Media coverage 2392: 2391: 2390: 2383: 2382:External links 2380: 2379: 2378: 2371: 2355: 2352: 2350: 2349: 2338: 2312: 2286: 2274: 2258: 2235: 2215:"Communicator" 2201: 2183: 2165: 2133: 2122:on 28 May 2012 2103: 2070: 2041: 2012: 1980: 1958: 1940: 1907: 1900: 1880: 1846: 1812: 1778: 1769: 1760: 1749: 1724: 1713: 1681: 1660: 1640:"TIA Lives On" 1625: 1596: 1579: 1561: 1542: 1511: 1491:James Poulos. 1480: 1452: 1435:The New Yorker 1420: 1388: 1365: 1363: 1360: 1359: 1358: 1353: 1348: 1343: 1338: 1332: 1327: 1322: 1316: 1310: 1305: 1300: 1295: 1289: 1284: 1278: 1272: 1264: 1261: 1257:William Safire 1223: 1220: 1186: 1183: 1146: 1143: 1134: 1131: 1118: 1115: 1107:speech-to-text 1087: 1084: 1072: 1069: 1048: 1045: 1010: 1007: 953:Main article: 950: 947: 940: 916: 913: 873: 870: 847: 844: 843: 842: 835: 832: 829: 826: 821:Fuse face and 819: 788: 785: 773: 770: 663: 660: 652:Edward Snowden 633:search warrant 623:by achieving " 595: 594: 592: 591: 584: 577: 569: 566: 565: 564: 563: 558: 553: 548: 547: 546: 541: 531: 530: 529: 524: 519: 509: 504: 496: 495: 494:Related topics 491: 490: 489: 488: 483: 478: 473: 468: 463: 455: 454: 450: 449: 448: 447: 446: 445: 440: 429: 428: 424: 423: 422: 421: 420: 419: 411: 410: 409: 404: 396: 395: 394: 389: 384: 376: 375: 374: 369: 361: 360: 359: 354: 343: 342: 338: 337: 336: 335: 330: 328:Dagger Complex 325: 320: 315: 310: 305: 300: 295: 287: 286: 282: 281: 280: 279: 274: 269: 264: 259: 254: 249: 244: 239: 234: 229: 224: 216: 215: 211: 210: 209: 208: 203: 198: 193: 188: 183: 178: 173: 168: 163: 158: 153: 148: 143: 138: 133: 128: 123: 118: 113: 105: 104: 100: 99: 98: 97: 92: 87: 82: 74: 73: 69: 68: 60: 59: 51: 50: 15: 9: 6: 4: 3: 2: 2772: 2761: 2758: 2756: 2753: 2751: 2748: 2746: 2743: 2741: 2740:DARPA offices 2738: 2737: 2735: 2724: 2720: 2715: 2714: 2713: 2712: 2701: 2697: 2690: 2686: 2679: 2674: 2673: 2672: 2671: 2663: 2659: 2655: 2650: 2646: 2642: 2637: 2633: 2629: 2625: 2620: 2619: 2603:on 2002-12-28 2602: 2598: 2593: 2589: 2588: 2583: 2579: 2575: 2571: 2567: 2557:on 2007-09-15 2556: 2552: 2548: 2544: 2540: 2536: 2532: 2527: 2523: 2519: 2515: 2514: 2504: 2497: 2492: 2488: 2484: 2480: 2476: 2471: 2470: 2459: 2456: 2451: 2447: 2442: 2439:. p. C2. 2438: 2433: 2429: 2424: 2420: 2415: 2411: 2407: 2403: 2398: 2397: 2389: 2386: 2385: 2376: 2372: 2370: 2366: 2365:Archive index 2362: 2358: 2357: 2347: 2342: 2327: 2323: 2316: 2301: 2297: 2290: 2283: 2278: 2271: 2267: 2262: 2255: 2251: 2247: 2244: 2239: 2225:on 2009-02-15 2224: 2220: 2216: 2210: 2208: 2206: 2199: 2195: 2192: 2187: 2181: 2177: 2174: 2169: 2155:on 2009-05-07 2154: 2150: 2146: 2140: 2138: 2121: 2117: 2113: 2107: 2092: 2088: 2084: 2077: 2075: 2060:on 2009-02-15 2059: 2055: 2051: 2045: 2031:on 2009-02-16 2030: 2026: 2022: 2016: 2002:on 2009-02-15 2001: 1997: 1993: 1987: 1985: 1978: 1973: 1971: 1969: 1967: 1965: 1963: 1956: 1952: 1949: 1944: 1929: 1925: 1921: 1914: 1912: 1903: 1901:9783319172446 1897: 1893: 1892: 1884: 1870:on 2009-02-16 1869: 1865: 1861: 1855: 1853: 1851: 1836:on 2009-02-15 1835: 1831: 1827: 1821: 1819: 1817: 1801: 1797: 1793: 1787: 1785: 1783: 1773: 1764: 1758: 1753: 1739:on 2006-04-24 1738: 1734: 1728: 1722: 1717: 1701: 1697: 1690: 1688: 1686: 1677: 1673: 1667: 1665: 1649: 1645: 1641: 1634: 1632: 1630: 1615:on 2009-03-25 1614: 1610: 1606: 1600: 1593: 1592:0-8050-9303-6 1589: 1583: 1577: 1573: 1568: 1566: 1557: 1553: 1546: 1531: 1530: 1525: 1522:John Horgan. 1518: 1516: 1500: 1499: 1494: 1487: 1485: 1469: 1468: 1463: 1456: 1449: 1437: 1436: 1431: 1424: 1417: 1405: 1404: 1399: 1396:Tim Dowling. 1392: 1384: 1380: 1376: 1370: 1366: 1357: 1354: 1352: 1349: 1347: 1344: 1342: 1339: 1336: 1333: 1331: 1328: 1326: 1323: 1320: 1317: 1314: 1311: 1309: 1306: 1304: 1301: 1299: 1298:Fusion center 1296: 1293: 1290: 1288: 1285: 1282: 1279: 1276: 1273: 1270: 1267: 1266: 1260: 1258: 1254: 1249: 1247: 1243: 1239: 1235: 1234: 1229: 1219: 1217: 1212: 1209: 1203: 1201: 1197: 1191: 1182: 1180: 1175: 1172: 1167: 1162: 1159: 1151: 1142: 1139: 1130: 1128: 1123: 1114: 1111: 1108: 1104: 1100: 1092: 1083: 1081: 1077: 1068: 1066: 1061: 1060: 1055: 1054: 1044: 1042: 1038: 1034: 1029: 1027: 1023: 1015: 1006: 1004: 1000: 996: 991: 988: 984: 979: 975: 971: 967: 962: 956: 939: 934: 932: 927: 925: 921: 912: 910: 905: 901: 898: 893: 888: 886: 878: 869: 866: 862: 860: 856: 852: 840: 836: 833: 830: 827: 824: 820: 817: 816: 815: 812: 810: 806: 802: 793: 784: 781: 779: 778:context aware 769: 765: 762: 758: 753: 750: 745: 744:Russ Feingold 740: 738: 732: 729: 725: 721: 717: 714: 710: 709: 703: 699: 697: 693: 689: 685: 684:Ronald Reagan 682:to President 681: 677: 668: 659: 657: 653: 649: 645: 640: 638: 634: 628: 626: 622: 618: 614: 610: 606: 602: 590: 585: 583: 578: 576: 571: 570: 568: 567: 562: 559: 557: 554: 552: 549: 545: 542: 540: 537: 536: 535: 532: 528: 525: 523: 520: 518: 515: 514: 513: 510: 508: 505: 503: 500: 499: 498: 497: 493: 492: 487: 484: 482: 479: 477: 474: 472: 469: 467: 464: 462: 459: 458: 457: 456: 452: 451: 444: 441: 439: 436: 435: 433: 432: 431: 430: 426: 425: 418: 415: 414: 412: 408: 405: 403: 400: 399: 397: 393: 390: 388: 385: 383: 380: 379: 377: 373: 370: 368: 365: 364: 362: 358: 355: 353: 350: 349: 347: 346: 345: 344: 340: 339: 334: 331: 329: 326: 324: 321: 319: 316: 314: 311: 309: 306: 304: 301: 299: 296: 294: 291: 290: 289: 288: 284: 283: 278: 275: 273: 270: 268: 265: 263: 260: 258: 255: 253: 250: 248: 245: 243: 240: 238: 235: 233: 230: 228: 225: 223: 220: 219: 218: 217: 213: 212: 207: 204: 202: 199: 197: 194: 192: 189: 187: 184: 182: 179: 177: 174: 172: 169: 167: 164: 162: 159: 157: 154: 152: 149: 147: 144: 142: 139: 137: 134: 132: 129: 127: 124: 122: 119: 117: 114: 112: 109: 108: 107: 106: 102: 101: 96: 93: 91: 88: 86: 83: 81: 78: 77: 76: 75: 71: 70: 66: 62: 61: 58: 57: 53: 52: 48: 44: 43: 37: 33: 30: 29: 21: 2722: 2710: 2709: 2689:the original 2669: 2668: 2662:the original 2658:The Atlantic 2657: 2644: 2632:the original 2627: 2605:. Retrieved 2601:the original 2585: 2559:. Retrieved 2555:the original 2539:the original 2502: 2478: 2474: 2457: 2436: 2427: 2418: 2410:the original 2405: 2341: 2330:. Retrieved 2325: 2315: 2303:. Retrieved 2299: 2289: 2282:TIA Lives On 2277: 2269: 2261: 2253: 2238: 2227:. Retrieved 2223:the original 2218: 2186: 2168: 2157:. Retrieved 2153:the original 2148: 2124:. Retrieved 2120:the original 2115: 2106: 2095:. Retrieved 2091:the original 2086: 2062:. Retrieved 2058:the original 2053: 2044: 2033:. Retrieved 2029:the original 2024: 2015: 2004:. Retrieved 2000:the original 1995: 1943: 1932:. Retrieved 1928:the original 1923: 1890: 1883: 1872:. Retrieved 1868:the original 1863: 1838:. Retrieved 1834:the original 1829: 1804:. Retrieved 1800:the original 1795: 1772: 1763: 1752: 1741:. Retrieved 1737:the original 1727: 1716: 1704:. Retrieved 1699: 1675: 1652:. Retrieved 1648:the original 1643: 1617:. Retrieved 1613:the original 1608: 1599: 1582: 1575: 1555: 1545: 1533:. Retrieved 1527: 1502:. Retrieved 1496: 1471:. Retrieved 1465: 1455: 1446: 1439:. Retrieved 1433: 1423: 1414: 1407:. Retrieved 1403:The Guardian 1401: 1391: 1383:the original 1369: 1313:Intellipedia 1252: 1250: 1238:John Markoff 1231: 1225: 1213: 1204: 1198:(run by the 1192: 1188: 1176: 1165: 1163: 1158:Communicator 1157: 1156: 1145:Communicator 1137: 1136: 1121: 1120: 1112: 1102: 1098: 1097: 1079: 1075: 1074: 1057: 1051: 1050: 1030: 1025: 1021: 1020: 969: 965: 964: 943:Sean McGahan 936: 928: 919: 918: 909:privacy laws 906: 902: 889: 884: 883: 867: 863: 854: 850: 849: 813: 804: 800: 798: 782: 775: 766: 760: 754: 741: 733: 730: 726: 722: 718: 712: 706: 704: 700: 673: 641: 629: 613:surveillance 604: 600: 598: 534:Human rights 512:Cryptography 303:Menwith Hill 293:The Doughnut 90:2013–present 54: 35: 26: 2595:Russ Kick. 2328:. p. 2 1473:19 December 1441:30 November 1409:30 November 990:Tom Daschle 141:Stone Ghost 72:Disclosures 2734:Categories 2607:2002-12-19 2561:2016-12-04 2332:2010-10-21 2229:2009-03-15 2159:2009-03-15 2097:2009-03-15 2064:2009-03-15 2050:"Genoa II" 2035:2009-03-15 2006:2009-03-15 1934:2009-03-15 1874:2009-03-15 1840:2009-03-15 1806:2009-03-15 1743:2006-03-03 1676:Wired News 1654:2009-03-16 1619:2009-03-15 1535:19 October 1504:19 October 1362:References 1230:came from 1065:Deep Green 1003:Carl Levin 955:Future Map 551:Satellites 348:Five Eyes 298:Fort Meade 151:Frenchelon 1948:FutureMap 1860:"Genisys" 1706:4 January 1335:Pre-crime 1319:MALINTENT 1275:Carnivore 1246:Orwellian 1236:reporter 983:bookmaker 970:FutureMAP 809:biometric 761:Terrorism 749:Ron Wyden 713:Terrorism 678:, former 627:" (TIA). 502:Espionage 333:GCHQ Bude 257:Five Eyes 196:RAMPART-A 131:Carnivore 111:XKeyscore 95:Reactions 2505:: 18–26. 2254:Newsweek 2246:Archived 2194:Archived 2176:Archived 1951:Archived 1263:See also 1216:Genoa II 1059:Genoa II 941:—  892:database 772:Research 648:Congress 619:to U.S. 453:Concepts 308:Pine Gap 227:R&AW 214:Agencies 186:Stingray 156:Fairview 136:Dishfire 126:Sentient 85:Pre-2013 47:a series 45:Part of 25:(motto: 2670:Accord: 2367:at the 2173:Babylon 2126:16 June 2021:"Genoa" 1992:"TIDES" 1448:power." 1292:ECHELON 1166:context 1122:Babylon 1117:Babylon 1001:, Sen. 885:Genisys 872:Genisys 805:HumanID 662:History 544:Liberty 539:Privacy 181:Pinwale 176:Bullrun 146:Tempora 121:ECHELON 103:Systems 80:Origins 2487:546782 2485:  2305:May 5, 2145:"EARS" 1898:  1700:Spying 1590:  1498:Forbes 1416:Earth. 1269:ADVISE 1127:triage 995:Oregon 686:, and 476:SIGINT 398:China 357:Lustre 285:Places 277:Mossad 161:MYSTIC 2711:Also: 2703:(PDF) 2692:(PDF) 2681:(PDF) 2499:(PDF) 1379:DARPA 1053:Genoa 1026:TIDES 1009:TIDES 757:DARPA 434:U.S. 363:U.S. 116:PRISM 2483:SSRN 2307:2010 2128:2016 1896:ISBN 1708:2014 1588:ISBN 1537:2013 1506:2013 1475:2013 1443:2013 1411:2013 1208:SAIC 1103:EARS 1056:and 1041:NIST 855:EELD 823:gait 799:The 688:SAIC 599:The 522:VPNs 392:GDPR 341:Laws 272:GCHQ 252:DGSE 247:ASIO 191:SORM 166:DCSN 28:lat. 2191:BSS 1977:CNN 1080:WAE 605:IAO 527:TLS 517:Tor 413:UK 378:EU 267:MSS 262:FSB 242:CNI 237:BND 232:CSE 222:NSA 2736:: 2721:. 2683:. 2656:. 2643:. 2626:. 2584:. 2572:. 2549:. 2533:. 2520:. 2501:. 2477:. 2404:. 2324:. 2298:. 2268:, 2252:, 2217:. 2204:^ 2147:. 2136:^ 2114:. 2085:. 2073:^ 2052:. 2023:. 1994:. 1983:^ 1961:^ 1922:. 1910:^ 1862:. 1849:^ 1828:. 1815:^ 1794:. 1781:^ 1698:. 1684:^ 1674:. 1663:^ 1642:. 1628:^ 1607:. 1574:, 1564:^ 1554:. 1526:. 1514:^ 1495:. 1483:^ 1464:. 1445:. 1432:. 1413:. 1400:. 1377:. 1129:. 1043:. 698:. 658:. 49:on 34:– 2647:. 2610:. 2576:. 2564:. 2489:. 2479:5 2430:. 2335:. 2309:. 2232:. 2162:. 2130:. 2100:. 2067:. 2038:. 2009:. 1937:. 1904:. 1877:. 1843:. 1809:. 1746:. 1710:. 1657:. 1622:. 1558:. 1539:. 1508:. 1477:. 1101:( 1078:( 1024:( 968:( 853:( 841:. 803:( 603:( 588:e 581:t 574:v 38:)

Index


lat.
scientia est potentia
a series
Global surveillance

Origins
Pre-2013
2013–present
Reactions
XKeyscore
PRISM
ECHELON
Sentient
Carnivore
Dishfire
Stone Ghost
Tempora
Frenchelon
Fairview
MYSTIC
DCSN
Boundless Informant
Bullrun
Pinwale
Stingray
SORM
RAMPART-A
Mastering the Internet
Jindalee Operational Radar Network

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.