Kenya, U.S. embassy attacked in
Kerr, Donald
Khobar Towers, Saudi Arabia, bombing of
Khomeini, Ayatollah Ruhollah
Kissinger, Henry A.
Kleinsmith, Erik:
and Able Danger
and China
data deleted by
influence of
as intelligence analysis instructor
and Karic
and Lockheed Martin
and privacy law
and September 11 attacks
and Special Operations
Klinghoffer, Leon
“Knowledge is power,”
Krongard, A. B. “Buzzy,”
Kuwait, Iraqi invasion of
Lake, Tony
Lambert, Geoffrey
Land Information Warfare Activity
Las Vegas, casinos in
Lawrence Livermore National Laboratory:
and ADVISE
IOWA center in
and Monitor
on technology and national security
Leahy, Patrick J.
Lebanon:
British policy in
civil war in
Sheikh Abdullah barracks in
Syrian occupation of
terrorist signals ignored in
U.S. embassy bombed in
U.S. government reaction to suicide bombing in
U.S. hostages in
U.S. Marines attacked in
Lehman, John
Leopold, Reuven
Libya, and Palestinian terrorists
Lockheed Martin
logic layer
Lohr, Michael
Lukasik, Steve
McCain, John
McCarthy, Mary:
and CIA
and Genoa
and NSC
and Office of Intelligence Programs
and Poindexter
and terrorist chatter
and TIA
McConnell, Mike
at Booz Allen
at Cantigny conference
and Clipper chip
and cybersecurity
and dark side of intelligence
as director of national intelligence
and FISA
and immunity from civil suits
and information warfare
as NSA director
Obama briefing by
and TIA
McCormick Tribune Foundation
“Counterterrorism Technology and Privacy,”
McFarlane, Robert “Bud”:
and
Achille Lauro
and Beirut suicide bombing
and Iran-Contra
and Poindexter
resignation of
McNamara, Robert S.
McVeigh, Timothy
Madrid, train bombings in
Manhattan Project
Manningham-Buller, Dame Eliza
Marines, U.S.:
attacked in Beirut
pulled out of Lebanon
rules of engagement
terrorist threats against
Markoff, John
Martin, Kate
Mayfield, Brandon
Meese, Edwin III
Microsoft
Miers, Harriet
MiloÅ¡eviÄ,Slobodan
Mogadishu, Somalia
Monitor110
Moreau, Art
Moussaoui, Zacarias
MoveOn.org
Mubarak, Hosni
Mueller, Robert
Musawi, Hussein
Myers-Briggs Type Indicator
Nacchio, Joe
National Association of Securities Dealers (NASD)
National-Geospatial Intelligence Agency
National Intelligence Office:
and Hayden
and McConnell
and Negroponte
and 9/11 Commission
and Tangram
National Journal
National Press Club
National Security Agency (NSA):
and ADVISE
after 9/11
and BAG
and British terrorist threat
and Clipper chip
and cybersecurity
data shared by
defense of government secrets
and digital revolution
and domestic spying
and early-warning system for terrorists
failed technology of
and FBI
financial intelligence in
and FISA
and foreign/domestic intelligence wall
and geo-location
global monitoring system of
information retrieval for
and information warfare
“in-memory” databases
lack of specificity in
mandate of
Operation Shamrock
and privacy protection
public image of
and Qwest
reputation of
and September 11 attacks
and Tangram
and TIA
and warrantless surveillance
National Security Council (NSC):
and
Achille Lauro
bureaucracy of
communications hotline
Counterterrorism Security Group (CSG)
Crisis Management Center
Crisis Pre-Planning Group (CPPG)
and interagency rivalry
and Iran-Contra
and Lebanon suicide bombing
Office of Intelligence Programs
powers of
Situation Room
Special Situation Group
Terrorist Incident Working Group
and terrorist interrogations
National Weather Service
Navy, U.S.:
and
Achille Lauro
cutbacks in
Task Force Alpha
Negroponte, John:
and airline security
and congressional hearings
as DNI
Netroots
New York Stock Exchange
New York Times
:
on pre-9/11 failures
on TIA
on warrantless surveillance
on worthless intelligence data
Nicaragua:
Contra rebels in
NSC operations in
9/11 Commission
NORA (Non-Obvious Relationship Awareness)
Noreaster
Northern Ireland, insurgency in
North, Oliver:
and
Achille Lauro
and Iran-Contra
personal traits of
and satellite photographs
and terrorism preplanning
Obama, Barack
and change as illusion
election campaign of
on executive powers
on immunity from civil suits
inaugural address of
intelligence briefings of
split with the party
on terrorist detention and interrogation
and warrantless surveillance
and war on terror
O'Neill, Dick
Operation Desert Storm
Operation Green Quest
Operation Shamrock
Pakistan:
Al Qaeda in
extremists in
Palestine:
Israel vs.
and Libya
Palestinian Liberation Front (PLF)
Pan Am Flight 103 bombing
Panetta, Leon
Parentage (visualization program)
Paulson, Henry
Paxton, Bill
Payne, James
Pelosi, Nancy
Pentagon, U.S.:
and Able Danger
Advanced Systems and Concepts Office
bureaucracy of
and Chinese spies
Criminal Investigation Task Force
emergency measures in
futurist projects of
global network operations of
and interagency rivalry
and privacy law
restrictions on Marines by
September 11 attack on
and TIA
Perry, William
Phillips, Jonathon
Philpot, Scott:
and Able Danger
and Al Qaeda
and destroyed data
and IDC
Pickering, Thomas
PLF (Palestinian Liberation Front)
Poindexter, John:
and
Achille Lauro
author's contacts with
and Beirut suicide bombing
career of
on changing the world
credibility of
current status of
gag order on
and Iran-Contra
legacy of
and loyalty
as national security adviser
privacy concerns of
and privacy conference
privacy invaded
public respect for
and retirement
and September 11 attacks
and Syracuse debate
and technology
and TIA,
see
TIA
Poindexter, Linda
Poindexter, Mark
Poindexter, Tom
Polski, Paul
Popp, Bob:
and Advanced Systems and Concepts Office
and ARDA
and Congress
and homeland security
and IAO logo
and NORA
and privacy
and TIA
Potenza, Vito
Powell, Colin L.
Preisser, Eileen
President's Daily Brief
Privacilla
privacy law
and cybersecurity
DOD 5240.1-R
Electronic Communications Privacy Act
and executive war powers
foreign/domestic intelligence wall in
and IDC
and the Internet
and NSA surveillance
and Protect America Act
see also
FISA
Protect America Act
Qwest Communications
RAM (random access memory)
and in-memory databases
and logic layer
Rauf, Rashid
Raytheon
Reagan, Ronald
and
Achille Lauro
in a fog
and Iran-Contra
and kidnappings in Lebanon
Medal of Freedom for
and NSA
Reagan administration:
and Beirut suicide bombing
and Iran-Contra
Reagan administration:
and national security
recruitment for
and Sheikh Abdullah barracks
and war against terrorism
Reid, Harry
Reid, John
Reno, Janet
Research Development and Experimental Collaboration (RDEC)
Reyes, Silvestre
Rice, Condoleezza
Risk Assessment and Horizon Scanning
Roberts, Julia
Roberts, Pat
Rockefeller, John
Rosa, Gerardo de
Rosen, Jeffrey
Rotenberg, Marc
Rudman, Warren
Rumsfeld, Donald H.:
and CIA
and FutureMAP
gag order from
and Poindexter
political enemies of
and war in Iraq
Russia, submarines (“goblins”) of
Ryan, Meg
Saffron
Safire, William
SAIC
St. Lawrence River, spy network on
San Francisco Weekly
SARS virus
Schoomaker, Peter
Schumer, Charles
Schwarzenegger, Arnold
Science Applications International Corporation
Sears Tower plot
Senator, Ted
September 11 attacks
advance warnings of
aftereffects of
and Al Qaeda
anniversary of
and aviation security
and change in administration
and Hayden
and Moussaoui
9/11 Commission report
pattern analysis of
and Poindexter
and war on terror
Shaffer, Tony
Sharkey, Brian:
and DARPA
and Spinnaker
and Syntek
and TIA
Sharqi
Shultz, George P.
Signals Security Agency
Silberman, Lawrence
Simhoni, Uri
Singapore, government of
Six Degrees of Kevin Bacon
Smart, J. C.
Soiffert, Alan
Southern Pacific Railroad
Speakes, Larry
Special Forces, and Al Qaeda
Special Operations Command:
and Al Qaeda
and bin Laden
hunting terrorists
and privacy law
Specter, Arlen
Spinnaker
Stark, Jim
Star Trek
(films)
State Department, U.S.:
access restricted by
bureaucracy of
communications hotline
conference on global threats
emergency measures in
foreign/domestic terrorism
and interagency rivalry
Steinhardt, Barry
Stellar Wind
Stethem, Robert
Stevens, Ted
Stewart, Jeff
Stiner, Carl
Strategic Command, U.S.
surveillance:
and BAG
in Britain
and Bush,
see
Bush administration
court use of evidence
electronic
of e-mails
emergency
and FISA,
see
FISA
inaccuracy of
legality of
and national security
and Obama administration
and privacy law
and Protect America Act
targeted, vs. metadata
and telecom companies,
see
telecommunications
uncontrolled
and USA PATRIOT Act
warrantless
and wiretaps
surveillance state, rise of
Syntek
Syracuse University