666:
1395:
636:
1304:) worked on dynamic face recognition. The research focused primarily on the extraction of body biometric features from video and identifying subjects from those features. To conduct its studies, the university created databases of synchronized multi-camera video sequences of body motion, human faces under a wide range of imaging conditions, AU coded expression videos, and hyperspectal and polarimetric images of faces. The video sequences of body motion data consisted of six separate viewpoints of 25 subjects walking on a treadmill. Four separate 11-second gaits were tested for each: slow walk, fast walk, inclined, and carrying a ball.
646:
656:
626:
69:
55:
1204:
720:
616:
27:
696:
708:
1109:. "Effective analysis across heterogenous databases" means the ability to take things from databases which are designed to store different types of data—such as a database containing criminal records, a phone call database and a foreign intelligence database. The Web is considered an "unstructured public data source" because it is publicly accessible and contains many different types of data—blogs, emails, records of visits to websites, etc.—all of which need to be analyzed and stored efficiently.
1294:. Gait recognition was a key component of HumanID, because it could be employed on low-resolution video feeds and therefore help identify subjects at a distance. They planned to develop a system that recovered static body and stride parameters of subjects as they walked, while also looking into the ability of time-normalized joint angle trajectories in the walking plane as a way of recognizing gait. The university also worked on finding and tracking faces by expressions and speech.
732:
763:
1237:
751:
676:
1344:
1093:
43:
1134:
1465:(SAIC) a $ 19 million contract to develop the "Information Awareness Prototype System", the core architecture to integrate all of TIA's information extraction, analysis, and dissemination tools. This was done through its consulting arm, Hicks & Associates, which employed many former Defense Department and military officials.
1416:
was first coined at the 1999 annual DARPAtech conference in a presentation by the deputy director of the Office of
Information Systems Management, Brian Sharkey. Sharkey applied the phrase to a conceptual method by which the government could sift through massive amounts of data becoming available via
1781:
Poindexter and his office proved to be more polarizing than expected; its Total
Information Awareness programme (later changed to Terrorism Information Awareness), which aimed to sift through huge amounts of data to track terrorists, was attacked on privacy grounds, and Congress eventually cancelled
1491:
The report arrived on May 20. It disclosed that the program's computer tools were still in their preliminary testing phase. Concerning the pattern recognition of transaction information, only synthetic data created by researchers was being processed. The report also conceded that a full prototype of
1149:
EELD was designed to design systems with the ability to extract data from multiple sources (e.g., text messages, social networking sites, financial records, and web pages). It was to develop the ability to detect patterns comprising multiple types of links between data items or communications (e.g.,
1385:
and policies, and report misuses of data. There were also plans for TIA to have an application that could "anonymize" data, so that information could be linked to an individual only by court order (especially for medical records gathered by the bio-surveillance project). A set of audit logs were to
1355:
by monitoring non-traditional data sources such as animal sentinels, behavioral indicators, and pre-diagnostic medical data. It would leverage existing disease models, identify abnormal health early indicators, and mine existing databases to determine the most valuable early indicators for abnormal
1066:
to assist human analysts. It was designed to support both top-down and bottom-up approaches; a policymaker could hypothesize an attack and use Genoa to look for supporting evidence of it or compile pieces of intelligence into a diagram and suggest possible outcomes. Human analysts could then modify
2986:
On the Web site of this particular program, the Total
Information Awareness Program, they cite a Latin slogan—"Knowledge is power"—something we would all agree with, and state: The total information awareness of transnational threats requires keeping track of individuals and understanding how they
2038:
The most widely reported data-mining project—the
Pentagon's Total Information Awareness (TIA) program—was shut down by Congress because of widespread privacy fears. The project sought to use credit-card, medical and travel records to search for terrorists and was dubbed by privacy advocates as a
1220:
speech, which is much more complex due to an essentially unlimited vocabulary and grammar, Communicator takes on task-specific issues so that there are constrained vocabularies (the system only needs to be able to understand language related to war). Research was also started on foreign-language
1211:
Communicator was to develop "dialogue interaction" technology to enable warfighters to talk to computers, such that information would be accessible on the battlefield or in command centers without a keyboard-based interface. Communicator was to be wireless, mobile, and to function in a networked
1215:
The dialogue interaction software was to interpret dialogue's context to improve performance, and to automatically adapt to new topics so conversation could be natural and efficient. Communicator emphasized task knowledge to compensate for natural language effects and noisy environments. Unlike
1534:
for the 2004 fiscal year, a classified annex provided the funding. It was stipulated that the technologies were limited for military or foreign intelligence purposes against non-U.S. citizens. Most of the original project goals and research findings were preserved, but the privacy protection
1364:
As a "virtual, centralized, grand database", the scope of surveillance included credit card purchases, magazine subscriptions, web browsing histories, phone records, academic grades, bank deposits, gambling histories, passport applications, airline and railway tickets, driver's licenses, gun
1158:
Wargaming the asymmetric environment (WAE) focused on developing automated technology that could identify predictive indicators of terrorist activity or impending attacks by examining individual and group behavior in broad environmental context and the motivation of specific terrorists.
1112:
Another goal was to develop "a large, distributed system architecture for managing the huge volume of raw data input, analysis results, and feedback, that will result in a simpler, more flexible data store that performs well and allows us to retain important data indefinitely".
1104:
technology at the time was insufficient for storing and organizing such enormous quantities of data. So they developed techniques for virtual data aggregation to support effective analysis across heterogeneous databases, as well as unstructured public data sources, such as the
1326:
was compiling a database to test facial systems. The data included a set of nine static pictures taken from different viewpoints, a video of each subject looking around a room, a video of the subject speaking, and one or more videos of the subject showing facial expressions.
1608:
The
Information Awareness Prototype System was reclassified as "Basketball" and work on it continued by SAIC, supervised by ARDA. As late as September 2004, Basketball was fully funded by the government and being tested in a research center jointly run by ARDA and SAIC.
2987:
fit into models. To this end, this office would seek to develop a way to integrate databases into a "virtual centralized grand database". They would be in a position to look at education, travel, and medical records, and develop risk profiles for millions of
Americans
1167:
Translingual information detection, extraction and summarization (TIDES) developed advanced language processing technology to enable
English speakers to find and interpret critical information in multiple languages without requiring knowledge of those languages.
1141:
Evidence extraction and link discovery (EELD) developed technologies and tools for automated discovery, extraction and linking of sparse evidence contained in large amounts of classified and unclassified data sources (such as phone call records from the
1380:
TIA's
Genisys component, in addition to integrating and organizing separate databases, was to run an internal "privacy protection program". This was intended to restrict analysts' access to irrelevant information on private U.S. citizens, enforce
1150:
financial transactions, communications, travel, etc.). It is designed to link items relating potential "terrorist" groups and scenarios, and to learn patterns of different groups or scenarios to identify new organizations and emerging threats.
1041:
Supported collaboration, analytical reasoning and information sharing so that analysts could hypothesize, test and propose theories and mitigating strategies, so decision-makers could effectively evaluate the impact of policies and courses of
852:
Although the program was formally suspended, other government agencies later adopted some of its software with only superficial changes. TIA's core architecture continued development under the code name "Basketball". According to a 2012
830:, TIA was meant to correlate detailed information about people in order to anticipate and prevent terrorist incidents before execution. The program modeled specific information sets in the hunt for terrorists around the globe. Admiral
1513:
On
September 30, 2003, Congress officially cut off TIA's funding and the Information Awareness Office (with the Senate voting unanimously against it) because of its unpopular perception by the general public and the media. Senators
1024:
TIA's goal was to revolutionize the United States' ability to detect, classify and identify foreign terrorists and decipher their plans, thereby enabling the U.S. to take timely action to preempt and disrupt terrorist activity.
1449:
division of DARPA, which managed TIA's development. The office temporarily operated out of the fourth floor of DARPA's headquarters, while
Poindexter looked for a place to permanently house TIA's researchers. Soon
1472:. Groove made it possible for analysts from many different agencies to share intelligence data instantly, and linked specialized programs that were designed to look for patterns of suspicious behavior.
1488:
passed in February, the Defense Department was given 90 days to compile a report laying out a schedule of TIA's development and the intended use of allotted funds or face a cutoff of support.
1100:
Genisys aimed to develop technologies that would enable "ultra-large, all-source information repositories". Vast amounts of information were to be collected and analyzed, and the available
1315:
and five-degree-of-freedom cameras. Tests included filming 38 male and 6 female subjects of different ethnicities and physical features walking along a T-shaped path from various angles.
849:
Congress defunded the Information Awareness Office in late 2003 after media reports criticized the government for attempting to establish "Total Information Awareness" over all citizens.
373:
1084:
While Genoa primarily focused on intelligence analysis, Genoa II aimed to provide means by which computers, software agents, policymakers, and field operatives could collaborate.
2152:"Report to Congress Regarding the Terrorism Information Awareness Program: In response to Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, § 111(b)"
2970:
1248:
identification technologies to detect, recognize and identify humans at great distances for "force protection", crime prevention, and "homeland security/defense" purposes.
1441:, he was working with Syntek Technologies, a company often contracted out by the government for work on defense projects. TIA was officially commissioned during the 2002
1484:
voted to limit TIA by restricting its ability to gather information from emails and the commercial databases of health, financial and travel companies. According to the
553:
1503:
began installing access nodes on TIA's classified network. The NSA then started running stacks of emails and intercepted communications through TIA's various programs.
3196:
419:
1656:
launched a campaign to terminate TIA's implementation, claiming that it would "kill privacy in America" because "every aspect of our lives would be catalogued". The
755:
1690:, TIA is portrayed as a UK-based surveillance database that can be used to track and monitor anybody by putting all available government information in one place.
1322:'s Department of Electronics and Computer Science was developing an "automatic gait recognition" system and was in charge of compiling a database to test it. The
338:
543:
2724:
3545:
2323:
1782:
it. "That was a dishonest misuse of DARPA," says Hans Mark, a former director of defense research and engineering now at the University of Texas at Austin.
1287:
2794:. Advanced Sciences and Technologies for Security Applications. Vol. 1 (illustrated ed.). Springer Science & Business Media. p. 283.
520:
2939:
665:
3496:
1038:
Automatically queued analysts based on partial pattern matches and had patterns that covered 90% of all previously known foreign terrorist attacks
3535:
1567:
1462:
958:
3130:
1530:
Reports began to emerge in February 2006 that TIA's components had been transferred to the authority of the NSA. In the Department of Defense
899:
communities. These components consisted of information analysis, collaboration, decision-support tools, language translation, data-searching,
2494:
700:
1368:
Health and biological information TIA collected included drug prescriptions, medical records, fingerprints, gait, face and iris data, and
1575:
472:
1311:'s Institute for Advanced Computer Studies' research focused on recognizing people at a distance by gait and face. Also to be used were
3260:
2628:
1547:
1301:
795:
515:
645:
736:
1593:
931:
2464:
3089:
3056:
568:
401:
391:
3170:
2594:
635:
3565:
3414:
2528:
1618:
1268:
Develop a low-power millimeter wave radar system for wide field of view detection and narrow field of view gait classification.
712:
563:
2912:
2662:
2557:
655:
625:
3560:
3016:
The Defense Department is leading the charge for what it calls Total Information Awareness, a massive database including DNA.
1559:
1009:
353:
348:
3441:
896:
888:
875:). The goal was to integrate components from previous and new government intelligence and surveillance programs, including
1265:
Develop and demonstrate a human identification system that operates out to 150 meters (500 ft) using visible imagery.
1531:
639:
548:
212:
1192:
977:
923:
3480:
3352:
3325:
3039:
2799:
2705:
2443:
2377:
2345:
2232:
2202:
2130:
2093:
1909:
1709:
1666:
1551:
2369:
Balancing Privacy & Security: The Privacy Implications of Government Data Mining Programs: Congressional Hearing
434:
241:
2019:
1925:
1062:
Unlike the other program components, Genoa predated TIA and provided a basis for it. Genoa's primary function was
615:
3555:
2736:
2057:
1546:, which focused on collaboration between machines and humans, was renamed "Topsail" and handed over to the NSA's
1283:
1001:
669:
649:
315:
131:
3570:
3418:
3141:
3100:
1653:
1579:
1555:
1386:
be kept, which would track whether innocent Americans' communications were getting caught up in relevant data.
788:
724:
217:
109:
2816:
1035:
Provided focused warnings within an hour after a triggering event occurred or an evidence threshold was passed
2859:
1954:
1574:
said that Topsail was "in the process of being canceled due to lack of funds". When asked about Topsail in a
1571:
1323:
997:
396:
251:
2284:"Outsourcing Big Brother: Office of Total Information Awareness relies on private sector to track Americans"
3178:
2920:
2565:
1446:
1405:
816:
679:
246:
35:
2694:
Bolle, Ruud M.; Connell, Jonathan; Pankanti, Sharath; Ratha, Nalini K.; Senior, Andrew W. (29 June 2013).
2283:
2291:
1217:
966:
915:
659:
629:
368:
1496:
in an attempt to stem the flow of criticism on its information-gathering practices on average citizens.
1492:
TIA would not be ready until the 2007 fiscal year. Also in May, Total Information Awareness was renamed
3550:
2732:
1685:
1617:
Critics allege that the program could be abused by government authorities as part of their practice of
1297:
1137:
Graphic displaying a simulated application of the evidence extraction and link discovery (EELD) project
1125:
to model the key characteristics of terrorist groups and discriminate them from other societal groups.
985:
170:
20:
1394:
1203:
871:
TIA was intended to be a five-year research project by the Defense Advanced Research Projects Agency (
3291:
3252:
3000:
2888:
2824:
1328:
1319:
1275:
1013:
981:
781:
3513:
1989:
1171:
Outside groups (such as universities, corporations, etc.) were invited to participate in the annual
3145:
2224:
The Pentagon's Brain: An Uncensored History of DARPA, America's Top-Secret Military Research Agency
1510:
to reward investors who predicted terrorist attacks, Poindexter resigned from office on 29 August.
1500:
860:
619:
59:
3446:
1750:
1658:
1398:
1122:
767:
454:
2502:
675:
26:
2971:"Wyden Calls For Congressional Oversight, Accountability of Total Information Awareness Office"
2766:
1507:
1438:
1308:
1005:
970:
558:
1901:
1468:
TIA's earliest version employed software called "Groove", which had been developed in 2000 by
1959:
1225:
1172:
1063:
363:
2636:
1635:
called it "the supersnoop's dream: a Total Information Awareness about every U.S. citizen".
973:, Adroit Systems, CACI Dynamic Systems, ASI Systems International, and Syntek Technologies.
68:
54:
2974:
2024:
1754:
1481:
1426:
906:
TIA research included or planned to include the participation of nine government entities:
586:
477:
3520:
3369:
3225:
2151:
1860:
8:
1714:
1642:
1332:
1255:
Develop algorithms to find and acquire subjects out to 150 meters (500 ft) in range.
1188:
1176:
989:
962:
900:
892:
827:
343:
303:
192:
126:
121:
73:
2758:
1795:
1758:
3490:
3314:
3230:
3201:
2851:
2472:
2256:
2062:
1994:
1865:
1841:
1627:
1570:
signed a $ 3.7 million contract for work on Topsail. In early 2006 a spokesman for the
1184:
993:
424:
3104:
2940:"Your city is spying on you: From iPhones to cameras, you are being watched right now"
2880:
3515:
Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, § 111(b)
3476:
3348:
3321:
3182:
3064:
3035:
2795:
2701:
2602:
2439:
2432:
2373:
2228:
2198:
2126:
1905:
1894:
1845:
1772:
1597:
1486:
Consolidated Appropriations Resolution, 2003, Pub. L. No. 108-7, Division M, § 111(b)
1143:
943:
839:
835:
2536:
1822:
Murray, N. (4 October 2010). "Profiling in the age of total information awareness".
883:, Genisys, SSNA, EELD, WAE, TIDES, Communicator, HumanID and Bio-Surveillance, with
2924:
2670:
2569:
2261:
1833:
1800:
1762:
1291:
1240:
Diagram describing capabilities of the "human identification at a distance" project
1162:
1079:
880:
449:
439:
202:
197:
104:
3397:
3090:"Total Information Awareness Programs: Funding, Composition, and Oversight Issues"
2193:
The Shadow Factory: The Ultra-Secret NSA from 9/11 to the Eavesdropping on America
2191:
846:, TIA was the "biggest surveillance program in the history of the United States".
3342:
3029:
2944:
2789:
2695:
2397:
2367:
2222:
2120:
1824:
1582:
1430:
1401:
1224:
Live exercises were conducted involving small unit logistics operations with the
1070:
Genoa was independently commissioned in 1996 and completed in 2002 as scheduled.
1032:
Increased information coverage by an order of magnitude and afforded easy scaling
831:
444:
99:
2085:
1861:"Pentagon Plans a Computer System That Would Peek at Personal Data of Americans"
1271:
Characterize gait performance from video for human identification at a distance.
3540:
3374:
1673:
1632:
1589:
1106:
855:
707:
497:
942:. They were to be able to access TIA's programs through a series of dedicated
819:. It operated under this title from February to May 2003 before being renamed
3529:
3283:
3068:
2402:
2315:
1837:
1699:
1669:
1563:
1451:
1434:
1244:
The human identification at a distance (HumanID) project developed automated
1121:
Scalable social network analysis (SSNA) aimed to develop techniques based on
1057:
876:
146:
2700:(illustrated ed.). Springer Science & Business Media. p. 239.
1028:
To that end, TIA was to create a counter-terrorism information system that:
2353:
1776:
1676:
said that because of Clapper's lie he lost hope to change things formally.
1586:
1519:
1352:
947:
429:
283:
76:
as of 2007, with countries subject to the most data collection shown in red
1662:
criticized the program for "Fighting terror by terrifying U.S. citizens".
1592:
said they did not know the program's status. Negroponte's deputy, former
1445:. In January 2002 Poindexter was appointed Director of the newly created
1442:
1382:
1236:
884:
731:
487:
358:
3521:
Report to Congress Regarding the Terrorism Information Awareness Program
976:
Universities enlisted to assist with research and development included
887:
knowledge gleaned from the private sector to create a resource for the
482:
141:
1331:
developed multiple systems for identification via facial recognition.
2966:
2122:
Privacy: Total Information Awareness Programs and Latest Developments
1930:
1704:
1638:
1515:
1469:
1245:
843:
719:
686:
538:
492:
293:
273:
187:
158:
136:
1767:
1738:
1351:
The bio-surveillance project was designed to predict and respond to
2828:
2499:
Northeastern University College of Computer and Information Science
1543:
1455:
1343:
1312:
1101:
951:
927:
591:
288:
236:
1175:, topic detection and tracking, automatic content extraction, and
3415:"Q&A on the Pentagon's "Total Information Awareness" Program"
762:
320:
298:
278:
263:
182:
94:
3316:
Nothing to Hide: The False Tradeoff Between Privacy and Security
1672:
lied about a massive data collection on US citizens and others.
1163:
Translingual information detection, extraction and summarization
3031:
Counterterrorism and Cybersecurity: Total Information Awareness
1641:, a former director of defense research and engineering at the
1365:
licenses, toll records, judicial records, and divorce records.
907:
750:
695:
268:
3197:"TECHNOLOGY; Many Tools Of Big Brother Are Now Up And Running"
2763:
University of Maryland Institute for Advanced Computer Studies
42:
2349:
2162:
1646:
1622:
1506:
Following a scandal in the Department of Defense involving a
1475:
1461:
Late that year, the Information Awareness Office awarded the
1207:
Diagram describing capabilities of the "communicator" project
935:
872:
231:
1926:"Pentagon's 'Terror Information Awareness' program will end"
1896:
Spies for Hire: The Secret World of Intelligence Outsourcing
1347:
Graphic describing the goals of the bio-surveillance project
1282:
A number of universities assisted in designing HumanID. The
3034:(2, illustrated, revised ed.). Springer. p. 141.
2020:"U.S. agencies collect, examine personal data on Americans"
1259:
1180:
939:
3344:
The Cost of Counterterrorism: Power, Politics, and Liberty
1092:
19:
Not to be confused with the fictional system portrayed in
3370:"Poindexter Will Be Quitting Over Terrorism Betting Plan"
2693:
2667:
Information Awareness Office (official website -- mirror)
2599:
Information Awareness Office (official website -- mirror)
2533:
Information Awareness Office (official website -- mirror)
1369:
1128:
919:
911:
3473:
Facts and Fears: Hard Truths From A Life In Intelligence
2817:"Automatic Gait Recognition for Human ID at a Distance"
2791:
Optical and Digital Techniques for Information Security
2623:
2621:
2619:
1153:
1133:
2434:
The Watchers: The Rise of America's Surveillance State
1335:
participated in implementing HumanID in poor weather.
1221:
computer interaction for use in coalition operations.
1231:
2616:
2324:
Georgia Institute of Technology College of Computing
1262:
recognition into a 24/7 human identification system.
859:
article, TIA's legacy was "quietly thriving" at the
815:) was a mass detection program by the United States
1116:
1096:
Graphic describing the goals of the Genysis project
46:
Presentation slide produced by DARPA describing TIA
3313:
2729:Carnegie Mellon University: The Robotics Institute
2657:
2655:
2653:
2459:
2457:
2455:
2431:
2190:
1893:
1433:. A former national security adviser to President
3475:(ebook ed.). New York: Viking. p. 226.
957:Companies contracted to work on TIA included the
3527:
3398:The Total Information Awareness Project Lives On
3057:"The Year in Ideas; Total Information Awareness"
2589:
2587:
1600:, said, "I'd like to answer in closed session."
1425:TIA was proposed as a program shortly after the
1228:to test the technology in extreme environments.
2937:
2650:
2633:Information Awareness Office (official website)
2523:
2521:
2519:
2469:Information Awareness Office (official website)
2452:
1952:
2759:"Human Identification at a Distance: Overview"
2725:"Human Identification at a Distance (HumanID)"
2086:"OVERVIEW OF THE INFORMATION AWARENESS OFFICE"
1987:
1463:Science Applications International Corporation
1274:Develop a multi-spectral infrared and visible
959:Science Applications International Corporation
521:Global surveillance disclosures (2013–present)
3442:"Fighting terror by terrifying U.S. citizens"
3131:"Genoa II DARPAtech 2002 Presentation Script"
2787:
2689:
2687:
2584:
2282:Mayle, Adam; Knott, Alex (17 December 2002).
2277:
2275:
2273:
2271:
2051:
2049:
2047:
1417:digitization and draw important conclusions.
789:
3495:: CS1 maint: multiple names: authors list (
2558:"Wargaming the Asymmetric Environment (WAE)"
2516:
2055:
2014:
2012:
3546:George W. Bush administration controversies
3347:. Cambridge University Press. p. 258.
3223:
2998:
2881:"Evaluation of Face Recognition Algorithms"
2495:"Current Research in Social Network Theory"
2398:"Genoa II: Man and Machine Thinking as One"
2216:
2214:
2146:
2144:
2142:
1793:
1558:). Tools from the program were used in the
1454:was completed and its research moved on to
3334:
3282:Richelson, Jeffrey T. (4 September 2013).
3261:United States Government Publishing Office
3001:"Driving dangerously with the Patriot Act"
2684:
2395:
2346:"Total Information Awareness (TIA) System"
2281:
2268:
2265:, 23 February 2006, retrieved 14 June 2016
2252:
2250:
2248:
2246:
2244:
2184:
2182:
2180:
2114:
2112:
2110:
2083:
2044:
1983:
1981:
1979:
1977:
1887:
1885:
1883:
1736:
1548:Advanced Research and Development Activity
1476:Congressional restrictions and termination
796:
782:
34:system from the official (decommissioned)
3466:
3464:
3439:
3281:
2965:
2425:
2423:
2421:
2391:
2389:
2125:(illustrated ed.). Nova Publishers.
2009:
1766:
2529:"Evidence Extraction and Link Discovery"
2310:
2308:
2220:
2211:
2139:
2039:"supersnoop" system to spy on Americans.
1891:
1732:
1730:
1393:
1359:
1342:
1235:
1202:
1146:, internet histories, or bank records).
1132:
1091:
946:. INSCOM was to house TIA's hardware in
41:
25:
3470:
3404:, 26 April 2006, retrieved 16 June 2016
3361:
3340:
3275:
3087:
2849:
2241:
2227:(illustrated ed.). Little, Brown.
2188:
2177:
2118:
2107:
1974:
1880:
1858:
1550:, or ARDA (ARDA was later moved to the
903:, and privacy-protection technologies.
569:Mass surveillance in the United Kingdom
3528:
3461:
3311:
3128:
2907:
2905:
2719:
2717:
2486:
2429:
2418:
2386:
1821:
1739:"Defence research: Still in the lead?"
1737:Weinberger, Sharon (24 January 2008).
1684:In the 2008 British television series
1619:mass surveillance in the United States
1129:Evidence extraction and link discovery
564:Mass surveillance in the United States
3536:Counterterrorism in the United States
3054:
2959:
2814:
2305:
2058:"Giving In to the Surveillance State"
1953:Jonathan Turley (November 17, 2002).
1787:
1727:
1679:
1420:
516:2005 warrantless surveillance scandal
3367:
2663:"Human Identification at a distance"
2316:"Human Identification at a Distance"
2197:. Knopf Doubleday Publishing Group.
1988:WILLIAM SAFIRE (November 14, 2002).
1195:were given grants to work on TIDES.
1154:Wargaming the asymmetric environment
3341:Donohue, Laura K. (14 April 2008).
3027:
3021:
2902:
2788:Bahram Javidi, ed. (28 June 2005).
2714:
1645:, called it a "dishonest misuse of
1338:
1300:'s Robotics Institute (part of the
1067:the diagram to test various cases.
866:
13:
2492:
2430:Harris, Shane (18 February 2010).
2189:Bamford, James (14 October 2008).
2084:Poindexter, John (2 August 2002).
1859:MARKOFF, JOHN (November 9, 2002).
1232:Human identification at a distance
1193:University of California, Berkeley
14:
3582:
3507:
2372:. DIANE Publishing. p. 126.
2352:. October 3, 2002. Archived from
2094:Federation of American Scientists
1710:Privacy laws of the United States
1667:Director of National Intelligence
1552:Director of National Intelligence
1499:At some point in early 2003, the
74:Map of global NSA data collection
3226:"Senate Rejects Privacy Project"
3224:ADAM CLYMER (January 24, 2003).
2056:SHANE HARRIS (August 22, 2012).
1117:Scalable social network analysis
761:
749:
730:
718:
706:
694:
674:
664:
654:
644:
634:
624:
614:
213:President's Surveillance Program
67:
53:
3440:ROB MORSE (November 20, 2002).
3433:
3407:
3390:
3368:Eric, Schmitt (1 August 2003).
3305:
3245:
3217:
3189:
3163:
3122:
3081:
3048:
2999:Pat M. Holt (October 2, 2003).
2992:
2931:
2873:
2843:
2808:
2781:
2751:
2550:
2396:Dan Verton (1 September 2003).
2360:
2338:
2077:
1900:. Simon and Schuster. pp.
1494:Terrorism Information Awareness
1284:Georgia Institute of Technology
1198:
821:Terrorism Information Awareness
3419:American Civil Liberties Union
3142:Electronic Frontier Foundation
3101:Congressional Research Service
3088:Belasco, Amy (21 March 2003).
2852:"Human Identification Project"
1946:
1918:
1852:
1815:
1796:"Funding for TIA All But Dead"
1654:American Civil Liberties Union
1580:National Intelligence Director
1556:Disruptive Technologies Office
1251:The goals of HumanID were to:
218:Terrorist Surveillance Program
1:
3566:Privacy of telecommunications
3055:Rosen, Jeffrey (2002-12-15).
2860:University of Texas at Dallas
2815:Nixon, M.S. (7 August 2003).
2438:(reprint ed.). Penguin.
1720:
1603:
1576:Senate Intelligence Committee
1572:Air Force Research Laboratory
1525:
1324:University of Texas at Dallas
1046:
397:Senate Intelligence Committee
3561:Privacy in the United States
3179:Information Awareness Office
3028:Lee, Newton (7 April 2015).
2921:Information Awareness Office
2566:Information Awareness Office
2119:Stevens, Gina Marie (2003).
1794:Ryan Singel (14 June 2003).
1612:
1578:hearing that February, both
1447:Information Awareness Office
1406:Information Awareness Office
817:Information Awareness Office
36:Information Awareness Office
7:
3471:Clapper, James R,. (2018).
2292:Center for Public Integrity
1955:"George Bush's Big Brother"
1693:
1414:total information awareness
1073:
967:Lockheed Martin Corporation
809:Total Information Awareness
374:FISA Amendments Act of 2008
369:Protect America Act of 2007
208:Total Information Awareness
32:Total Information Awareness
10:
3587:
3312:Solove, Daniel J. (2011).
2733:Carnegie Mellon University
1538:
1535:mechanics were abandoned.
1408:and chief supporter of TIA
1389:
1375:
1302:School of Computer Science
1298:Carnegie Mellon University
1087:
1077:
1055:
1019:
171:Tailored Access Operations
21:The Last Enemy (TV series)
18:
3320:. Yale University Press.
3292:National Security Archive
3005:Christian Science Monitor
2889:Colorado State University
2825:University of Southampton
1429:in 2001, by Rear Admiral
1329:Colorado State University
1320:University of Southampton
1216:automated translation of
544:Surveillance of reporters
402:National Security Council
16:US mass detection program
3447:San Francisco Chronicle
2221:Jacobsen, Annie (2015).
1838:10.1177/0306396810377002
1501:National Security Agency
1480:On 24 January 2003, the
1437:and a key player in the
1051:
861:National Security Agency
842:". According to Senator
826:Based on the concept of
60:National Security Agency
2288:www.publicintegrity.org
1751:Nature Publishing Group
1659:San Francisco Chronicle
1566:. In October 2005, the
1562:and other parts of the
1123:social network analysis
969:, Schafer Corporation,
3556:Management cybernetics
3396:Mark Williams Pontin.
2767:University of Maryland
1892:Shorrock, Tim (2008).
1665:Still, in 2013 former
1409:
1404:, the director of the
1348:
1309:University of Maryland
1241:
1208:
1138:
1097:
559:Insider Threat Program
47:
39:
3571:Surveillance scandals
3402:MIT Technology Review
2938:Anthony M. Townsend.
1960:The Los Angeles Times
1397:
1360:Scope of surveillance
1346:
1239:
1226:United States Marines
1206:
1173:information retrieval
1136:
1095:
1064:intelligence analysis
364:Homeland Security Act
258:Databases, tools etc.
45:
29:
3284:"The Snowden Affair"
3129:Armour, Tom (2002).
2975:United States Senate
2969:(January 15, 2003).
2885:www.cs.colostate.edu
2673:on February 15, 2009
2505:on February 26, 2015
2025:The Washington Times
1482:United States Senate
1427:September 11 attacks
1288:College of Computing
554:UN diplomatic spying
3205:. December 23, 2002
2913:"Bio- Surveillance"
2821:www.ecs.soton.ac.uk
2697:Guide to Biometrics
2356:on October 3, 2002.
1990:"You Are a Suspect"
1759:2008Natur.451..390W
1715:Situation awareness
1643:University of Texas
1532:appropriations bill
1356:health conditions.
1333:Columbia University
1189:Columbia University
1179:evaluations run by
1177:machine translation
963:Booz Allen Hamilton
901:pattern recognition
893:counterintelligence
828:predictive policing
425:Hepting v. AT&T
344:Privacy Act of 1974
122:Upstream collection
3253:"Joint Resolution"
3231:The New York Times
3202:The New York Times
3061:The New York Times
2063:The New York Times
1995:The New York Times
1866:The New York Times
1680:In popular culture
1628:The New York Times
1560:war in Afghanistan
1554:'s control as the
1439:Iran–Contra affair
1421:Early developments
1410:
1349:
1242:
1209:
1185:Cornell University
1139:
1098:
435:Clapper v. Amnesty
310:GCHQ collaboration
304:BOUNDLESSINFORMANT
48:
40:
3551:Mass surveillance
3288:nsarchive.gwu.edu
3175:www.darpa.mil/iao
2917:www.darpa.mil/iao
2562:www.darpa.mil/iao
2320:www.cc.gatech.edu
1598:Michael V. Hayden
1144:NSA call database
840:counter-terrorism
836:Manhattan Project
806:
805:
3578:
3501:
3500:
3494:
3486:
3468:
3459:
3458:
3456:
3454:
3437:
3431:
3430:
3428:
3426:
3421:. April 20, 2003
3411:
3405:
3394:
3388:
3387:
3385:
3383:
3378:. Washington D.C
3365:
3359:
3358:
3338:
3332:
3331:
3319:
3309:
3303:
3302:
3300:
3298:
3279:
3273:
3272:
3270:
3268:
3249:
3243:
3242:
3240:
3238:
3221:
3215:
3214:
3212:
3210:
3193:
3187:
3186:
3181:. Archived from
3167:
3161:
3160:
3158:
3156:
3150:
3144:. Archived from
3135:
3126:
3120:
3119:
3117:
3115:
3110:on June 27, 2004
3109:
3103:. Archived from
3097:www.au.af.mil/au
3094:
3085:
3079:
3078:
3076:
3075:
3052:
3046:
3045:
3025:
3019:
3018:
3013:
3011:
2996:
2990:
2989:
2983:
2981:
2963:
2957:
2956:
2954:
2952:
2935:
2929:
2928:
2923:. Archived from
2909:
2900:
2899:
2897:
2895:
2877:
2871:
2870:
2868:
2866:
2856:www.utdallas.edu
2850:O'Toole, Alice.
2847:
2841:
2840:
2838:
2836:
2827:. Archived from
2812:
2806:
2805:
2785:
2779:
2778:
2776:
2774:
2755:
2749:
2748:
2746:
2744:
2739:on 9 August 2016
2735:. Archived from
2721:
2712:
2711:
2691:
2682:
2681:
2679:
2678:
2669:. Archived from
2659:
2648:
2647:
2645:
2644:
2635:. Archived from
2625:
2614:
2613:
2611:
2610:
2601:. Archived from
2591:
2582:
2581:
2579:
2577:
2568:. Archived from
2554:
2548:
2547:
2545:
2544:
2535:. Archived from
2525:
2514:
2513:
2511:
2510:
2501:. Archived from
2490:
2484:
2483:
2481:
2480:
2471:. Archived from
2461:
2450:
2449:
2437:
2427:
2416:
2415:
2413:
2411:
2406:. IDG Enterprise
2393:
2384:
2383:
2364:
2358:
2357:
2342:
2336:
2335:
2333:
2331:
2312:
2303:
2302:
2300:
2298:
2279:
2266:
2262:National Journal
2254:
2239:
2238:
2218:
2209:
2208:
2196:
2186:
2175:
2174:
2172:
2170:
2156:
2148:
2137:
2136:
2116:
2105:
2104:
2102:
2100:
2081:
2075:
2074:
2072:
2070:
2053:
2042:
2041:
2035:
2033:
2016:
2007:
2006:
2004:
2002:
1985:
1972:
1971:
1969:
1967:
1950:
1944:
1943:
1941:
1939:
1934:. AP. 2003-09-25
1922:
1916:
1915:
1899:
1889:
1878:
1877:
1875:
1873:
1856:
1850:
1849:
1825:Race & Class
1819:
1813:
1812:
1810:
1808:
1791:
1785:
1784:
1770:
1734:
1522:led the effort.
1339:Bio-surveillance
1292:gait recognition
1276:face recognition
1218:natural language
1080:Project Genoa II
971:SRS Technologies
867:Program synopsis
798:
791:
784:
766:
765:
754:
753:
735:
734:
723:
722:
711:
710:
699:
698:
678:
668:
658:
648:
638:
628:
618:
450:Wikimedia v. NSA
440:Klayman v. Obama
339:Safe Streets Act
71:
57:
50:
49:
3586:
3585:
3581:
3580:
3579:
3577:
3576:
3575:
3526:
3525:
3510:
3505:
3504:
3488:
3487:
3483:
3469:
3462:
3452:
3450:
3438:
3434:
3424:
3422:
3413:
3412:
3408:
3395:
3391:
3381:
3379:
3366:
3362:
3355:
3339:
3335:
3328:
3310:
3306:
3296:
3294:
3280:
3276:
3266:
3264:
3263:. February 2003
3251:
3250:
3246:
3236:
3234:
3222:
3218:
3208:
3206:
3195:
3194:
3190:
3169:
3168:
3164:
3154:
3152:
3148:
3133:
3127:
3123:
3113:
3111:
3107:
3092:
3086:
3082:
3073:
3071:
3053:
3049:
3042:
3026:
3022:
3009:
3007:
2997:
2993:
2979:
2977:
2964:
2960:
2950:
2948:
2936:
2932:
2911:
2910:
2903:
2893:
2891:
2879:
2878:
2874:
2864:
2862:
2848:
2844:
2834:
2832:
2813:
2809:
2802:
2786:
2782:
2772:
2770:
2769:. 17 April 2001
2757:
2756:
2752:
2742:
2740:
2723:
2722:
2715:
2708:
2692:
2685:
2676:
2674:
2661:
2660:
2651:
2642:
2640:
2627:
2626:
2617:
2608:
2606:
2593:
2592:
2585:
2575:
2573:
2556:
2555:
2551:
2542:
2540:
2527:
2526:
2517:
2508:
2506:
2493:Ethier, Jason.
2491:
2487:
2478:
2476:
2463:
2462:
2453:
2446:
2428:
2419:
2409:
2407:
2394:
2387:
2380:
2366:
2365:
2361:
2344:
2343:
2339:
2329:
2327:
2314:
2313:
2306:
2296:
2294:
2280:
2269:
2255:
2242:
2235:
2219:
2212:
2205:
2187:
2178:
2168:
2166:
2154:
2150:
2149:
2140:
2133:
2117:
2108:
2098:
2096:
2082:
2078:
2068:
2066:
2054:
2045:
2031:
2029:
2018:
2017:
2010:
2000:
1998:
1986:
1975:
1965:
1963:
1951:
1947:
1937:
1935:
1924:
1923:
1919:
1912:
1890:
1881:
1871:
1869:
1857:
1853:
1820:
1816:
1806:
1804:
1792:
1788:
1768:10.1038/451390a
1735:
1728:
1723:
1696:
1682:
1615:
1606:
1583:John Negroponte
1541:
1528:
1478:
1431:John Poindexter
1423:
1402:John Poindexter
1392:
1378:
1362:
1341:
1234:
1201:
1165:
1156:
1131:
1119:
1090:
1082:
1076:
1060:
1054:
1049:
1022:
986:Carnegie Mellon
897:law enforcement
869:
832:John Poindexter
802:
773:
772:
760:
748:
729:
717:
705:
693:
605:
597:
596:
582:
574:
573:
534:
526:
525:
511:
503:
502:
468:
460:
459:
445:ACLU v. Clapper
415:
407:
406:
387:
379:
378:
334:
326:
325:
85:
77:
58:
30:Diagram of the
24:
17:
12:
11:
5:
3584:
3574:
3573:
3568:
3563:
3558:
3553:
3548:
3543:
3538:
3524:
3523:
3518:
3509:
3508:External links
3506:
3503:
3502:
3481:
3460:
3432:
3406:
3389:
3375:New York Times
3360:
3353:
3333:
3326:
3304:
3274:
3244:
3216:
3188:
3185:on 2009-02-16.
3162:
3121:
3080:
3047:
3040:
3020:
2991:
2958:
2930:
2927:on 2006-09-19.
2901:
2872:
2842:
2807:
2800:
2780:
2750:
2713:
2706:
2683:
2649:
2629:"Communicator"
2615:
2583:
2572:on 28 May 2012
2549:
2515:
2485:
2451:
2444:
2417:
2385:
2378:
2359:
2337:
2304:
2267:
2240:
2233:
2210:
2203:
2176:
2138:
2131:
2106:
2076:
2043:
2028:. May 28, 2004
2008:
1973:
1945:
1917:
1910:
1879:
1851:
1814:
1786:
1725:
1724:
1722:
1719:
1718:
1717:
1712:
1707:
1702:
1695:
1692:
1687:The Last Enemy
1681:
1678:
1674:Edward Snowden
1633:William Safire
1614:
1611:
1605:
1602:
1590:Robert Mueller
1540:
1537:
1527:
1524:
1477:
1474:
1422:
1419:
1391:
1388:
1377:
1374:
1361:
1358:
1340:
1337:
1280:
1279:
1272:
1269:
1266:
1263:
1258:Fuse face and
1256:
1233:
1230:
1200:
1197:
1164:
1161:
1155:
1152:
1130:
1127:
1118:
1115:
1107:World Wide Web
1089:
1086:
1078:Main article:
1075:
1072:
1056:Main article:
1053:
1050:
1048:
1045:
1044:
1043:
1039:
1036:
1033:
1021:
1018:
982:Colorado State
868:
865:
856:New York Times
804:
803:
801:
800:
793:
786:
778:
775:
774:
771:
770:
758:
745:
744:
740:
739:
727:
715:
703:
690:
689:
683:
682:
672:
662:
652:
642:
632:
622:
611:
610:
606:
603:
602:
599:
598:
595:
594:
589:
583:
580:
579:
576:
575:
572:
571:
566:
561:
556:
551:
546:
541:
535:
532:
531:
528:
527:
524:
523:
518:
512:
509:
508:
505:
504:
501:
500:
498:Edward Snowden
495:
490:
485:
480:
475:
473:William Binney
469:
467:Whistleblowers
466:
465:
462:
461:
458:
457:
452:
447:
442:
437:
432:
427:
422:
416:
413:
412:
409:
408:
405:
404:
399:
394:
388:
385:
384:
381:
380:
377:
376:
371:
366:
361:
356:
351:
346:
341:
335:
332:
331:
328:
327:
324:
323:
318:
312:
311:
307:
306:
301:
296:
291:
286:
281:
276:
271:
266:
260:
259:
255:
254:
249:
244:
239:
234:
228:
227:
223:
222:
221:
220:
210:
205:
200:
195:
190:
185:
179:
178:
174:
173:
167:
166:
162:
161:
155:
154:
150:
149:
144:
139:
134:
129:
124:
118:
117:
113:
112:
107:
102:
97:
91:
90:
86:
83:
82:
79:
78:
72:
64:
63:
15:
9:
6:
4:
3:
2:
3583:
3572:
3569:
3567:
3564:
3562:
3559:
3557:
3554:
3552:
3549:
3547:
3544:
3542:
3539:
3537:
3534:
3533:
3531:
3522:
3519:
3517:
3516:
3512:
3511:
3498:
3492:
3484:
3482:9780525558651
3478:
3474:
3467:
3465:
3449:
3448:
3443:
3436:
3420:
3416:
3410:
3403:
3399:
3393:
3377:
3376:
3371:
3364:
3356:
3354:9781139469579
3350:
3346:
3345:
3337:
3329:
3327:9780300177251
3323:
3318:
3317:
3308:
3293:
3289:
3285:
3278:
3262:
3258:
3254:
3248:
3233:
3232:
3227:
3220:
3204:
3203:
3198:
3192:
3184:
3180:
3176:
3172:
3166:
3151:on 2016-10-08
3147:
3143:
3139:
3132:
3125:
3106:
3102:
3098:
3091:
3084:
3070:
3066:
3062:
3058:
3051:
3043:
3041:9783319172446
3037:
3033:
3032:
3024:
3017:
3006:
3002:
2995:
2988:
2976:
2972:
2968:
2962:
2947:
2946:
2941:
2934:
2926:
2922:
2918:
2914:
2908:
2906:
2890:
2886:
2882:
2876:
2861:
2857:
2853:
2846:
2831:on 2016-08-05
2830:
2826:
2822:
2818:
2811:
2803:
2801:9780387206165
2797:
2793:
2792:
2784:
2768:
2764:
2760:
2754:
2738:
2734:
2730:
2726:
2720:
2718:
2709:
2707:9781475740363
2703:
2699:
2698:
2690:
2688:
2672:
2668:
2664:
2658:
2656:
2654:
2639:on 2009-02-15
2638:
2634:
2630:
2624:
2622:
2620:
2605:on 2009-02-15
2604:
2600:
2596:
2590:
2588:
2571:
2567:
2563:
2559:
2553:
2539:on 2009-02-15
2538:
2534:
2530:
2524:
2522:
2520:
2504:
2500:
2496:
2489:
2475:on 2009-02-16
2474:
2470:
2466:
2460:
2458:
2456:
2447:
2445:9781101195741
2441:
2436:
2435:
2426:
2424:
2422:
2405:
2404:
2403:Computerworld
2399:
2392:
2390:
2381:
2379:9781422320259
2375:
2371:
2370:
2363:
2355:
2351:
2347:
2341:
2325:
2321:
2317:
2311:
2309:
2293:
2289:
2285:
2278:
2276:
2274:
2272:
2264:
2263:
2258:
2253:
2251:
2249:
2247:
2245:
2236:
2234:9780316371650
2230:
2226:
2225:
2217:
2215:
2206:
2204:9780385528399
2200:
2195:
2194:
2185:
2183:
2181:
2165:. 20 May 2003
2164:
2160:
2153:
2147:
2145:
2143:
2134:
2132:9781590338698
2128:
2124:
2123:
2115:
2113:
2111:
2095:
2091:
2087:
2080:
2065:
2064:
2059:
2052:
2050:
2048:
2040:
2027:
2026:
2021:
2015:
2013:
2001:September 20,
1997:
1996:
1991:
1984:
1982:
1980:
1978:
1962:
1961:
1956:
1949:
1933:
1932:
1927:
1921:
1913:
1911:9780743282246
1907:
1903:
1898:
1897:
1888:
1886:
1884:
1868:
1867:
1862:
1855:
1847:
1843:
1839:
1835:
1831:
1827:
1826:
1818:
1803:
1802:
1797:
1790:
1783:
1778:
1774:
1769:
1764:
1760:
1756:
1752:
1748:
1744:
1740:
1733:
1731:
1726:
1716:
1713:
1711:
1708:
1706:
1703:
1701:
1698:
1697:
1691:
1689:
1688:
1677:
1675:
1671:
1670:James Clapper
1668:
1663:
1661:
1660:
1655:
1650:
1648:
1644:
1640:
1636:
1634:
1630:
1629:
1624:
1620:
1610:
1601:
1599:
1595:
1591:
1588:
1584:
1581:
1577:
1573:
1569:
1565:
1564:War on Terror
1561:
1557:
1553:
1549:
1545:
1536:
1533:
1523:
1521:
1517:
1511:
1509:
1504:
1502:
1497:
1495:
1489:
1487:
1483:
1473:
1471:
1466:
1464:
1459:
1457:
1453:
1452:Project Genoa
1448:
1444:
1440:
1436:
1435:Ronald Reagan
1432:
1428:
1418:
1415:
1407:
1403:
1400:
1396:
1387:
1384:
1373:
1371:
1366:
1357:
1354:
1345:
1336:
1334:
1330:
1325:
1321:
1316:
1314:
1310:
1305:
1303:
1299:
1295:
1293:
1289:
1285:
1277:
1273:
1270:
1267:
1264:
1261:
1257:
1254:
1253:
1252:
1249:
1247:
1238:
1229:
1227:
1222:
1219:
1213:
1212:environment.
1205:
1196:
1194:
1190:
1186:
1182:
1178:
1174:
1169:
1160:
1151:
1147:
1145:
1135:
1126:
1124:
1114:
1110:
1108:
1103:
1094:
1085:
1081:
1071:
1068:
1065:
1059:
1058:Project Genoa
1040:
1037:
1034:
1031:
1030:
1029:
1026:
1017:
1015:
1011:
1007:
1003:
999:
995:
991:
987:
983:
979:
974:
972:
968:
964:
960:
955:
953:
949:
945:
941:
937:
933:
929:
925:
921:
917:
913:
909:
904:
902:
898:
894:
890:
886:
882:
878:
874:
864:
862:
858:
857:
850:
847:
845:
841:
837:
834:called it a "
833:
829:
824:
822:
818:
814:
810:
799:
794:
792:
787:
785:
780:
779:
777:
776:
769:
764:
759:
757:
752:
747:
746:
742:
741:
738:
733:
728:
726:
721:
716:
714:
709:
704:
702:
697:
692:
691:
688:
685:
684:
681:
677:
673:
671:
667:
663:
661:
657:
653:
651:
647:
643:
641:
637:
633:
631:
627:
623:
621:
617:
613:
612:
609:United States
608:
607:
604:Collaboration
601:
600:
593:
590:
588:
585:
584:
578:
577:
570:
567:
565:
562:
560:
557:
555:
552:
550:
549:Mail tracking
547:
545:
542:
540:
537:
536:
530:
529:
522:
519:
517:
514:
513:
507:
506:
499:
496:
494:
491:
489:
486:
484:
481:
479:
476:
474:
471:
470:
464:
463:
456:
453:
451:
448:
446:
443:
441:
438:
436:
433:
431:
428:
426:
423:
421:
418:
417:
411:
410:
403:
400:
398:
395:
393:
390:
389:
383:
382:
375:
372:
370:
367:
365:
362:
360:
357:
355:
352:
350:
347:
345:
342:
340:
337:
336:
330:
329:
322:
319:
317:
314:
313:
309:
308:
305:
302:
300:
297:
295:
292:
290:
287:
285:
282:
280:
277:
275:
272:
270:
267:
265:
262:
261:
257:
256:
253:
250:
248:
245:
243:
240:
238:
235:
233:
230:
229:
225:
224:
219:
216:
215:
214:
211:
209:
206:
204:
201:
199:
196:
194:
191:
189:
186:
184:
181:
180:
176:
175:
172:
169:
168:
164:
163:
160:
157:
156:
152:
151:
148:
145:
143:
140:
138:
135:
133:
130:
128:
125:
123:
120:
119:
115:
114:
111:
108:
106:
103:
101:
98:
96:
93:
92:
88:
87:
81:
80:
75:
70:
66:
65:
61:
56:
52:
51:
44:
37:
33:
28:
22:
3514:
3472:
3451:. Retrieved
3445:
3435:
3423:. Retrieved
3409:
3401:
3392:
3380:. Retrieved
3373:
3363:
3343:
3336:
3315:
3307:
3295:. Retrieved
3287:
3277:
3265:. Retrieved
3256:
3247:
3235:. Retrieved
3229:
3219:
3207:. Retrieved
3200:
3191:
3183:the original
3174:
3165:
3153:. Retrieved
3146:the original
3137:
3124:
3112:. Retrieved
3105:the original
3096:
3083:
3072:. Retrieved
3060:
3050:
3030:
3023:
3015:
3008:. Retrieved
3004:
2994:
2985:
2978:. Retrieved
2961:
2949:. Retrieved
2943:
2933:
2925:the original
2916:
2892:. Retrieved
2884:
2875:
2863:. Retrieved
2855:
2845:
2833:. Retrieved
2829:the original
2820:
2810:
2790:
2783:
2771:. Retrieved
2762:
2753:
2741:. Retrieved
2737:the original
2728:
2696:
2675:. Retrieved
2671:the original
2666:
2641:. Retrieved
2637:the original
2632:
2607:. Retrieved
2603:the original
2598:
2574:. Retrieved
2570:the original
2561:
2552:
2541:. Retrieved
2537:the original
2532:
2507:. Retrieved
2503:the original
2498:
2488:
2477:. Retrieved
2473:the original
2468:
2433:
2408:. Retrieved
2401:
2368:
2362:
2354:the original
2340:
2328:. Retrieved
2319:
2295:. Retrieved
2287:
2260:
2257:TIA Lives On
2223:
2192:
2167:. Retrieved
2159:www.epic.org
2158:
2121:
2097:. Retrieved
2089:
2079:
2067:. Retrieved
2061:
2037:
2030:. Retrieved
2023:
1999:. Retrieved
1993:
1964:. Retrieved
1958:
1948:
1936:. Retrieved
1929:
1920:
1895:
1870:. Retrieved
1864:
1854:
1829:
1823:
1817:
1805:. Retrieved
1799:
1789:
1780:
1746:
1742:
1686:
1683:
1664:
1657:
1651:
1637:
1626:
1616:
1607:
1594:NSA director
1587:FBI Director
1542:
1529:
1520:Byron Dorgan
1512:
1505:
1498:
1493:
1490:
1485:
1479:
1467:
1460:
1424:
1413:
1411:
1383:privacy laws
1379:
1367:
1363:
1353:bioterrorism
1350:
1317:
1306:
1296:
1281:
1250:
1243:
1223:
1214:
1210:
1199:Communicator
1170:
1166:
1157:
1148:
1140:
1120:
1111:
1099:
1083:
1069:
1061:
1027:
1023:
1002:Georgia Tech
975:
956:
948:Fort Belvoir
905:
889:intelligence
870:
854:
851:
848:
825:
820:
812:
808:
807:
478:Thomas Drake
455:US v. Moalin
430:Jewel v. NSA
386:Institutions
284:TRAFFICTHIEF
207:
62:surveillance
31:
3453:21 December
3425:19 December
3257:www.gpo.gov
3010:19 December
2980:19 December
2951:19 December
2069:19 December
2032:19 December
1966:19 December
1938:19 December
1872:19 December
1832:(2): 3–24.
1753:: 390–393.
1443:fiscal year
1290:focused on
1014:Southampton
885:data mining
510:Publication
488:Thomas Tamm
420:ACLU v. NSA
359:Patriot Act
333:Legislation
193:Trailblazer
3530:Categories
3237:7 December
3209:7 December
3138:w2.eff.org
3074:2021-04-03
2677:2009-03-15
2643:2009-03-15
2609:2009-03-15
2543:2009-03-15
2509:2009-03-15
2479:2009-03-15
1807:7 December
1721:References
1604:Basketball
1526:After 2003
1191:, and the
1047:Components
483:Mark Klein
226:Since 2007
198:Turbulence
177:Since 2001
165:Since 1998
153:Since 1990
142:ThinThread
116:Since 1978
3491:cite book
3069:0362-4331
2967:Ron Wyden
2465:"Genisys"
1931:USA Today
1846:144001217
1705:Pre-crime
1639:Hans Mark
1613:Criticism
1516:Ron Wyden
1470:Ray Ozzie
1412:The term
1246:biometric
844:Ron Wyden
687:Five Eyes
539:Cablegate
493:Russ Tice
294:XKeyscore
274:Main Core
242:Stateroom
188:STORMBREW
159:RAMPART-A
137:Main Core
1777:18216826
1749:(7177).
1694:See also
1621:. In an
1544:Genoa II
1508:proposal
1456:Genoa II
1313:infrared
1102:database
1074:Genoa II
1006:Maryland
990:Columbia
978:Berkeley
952:Virginia
928:STRATCOM
881:Genoa II
630:CYBERCOM
592:Metadata
581:Concepts
414:Lawsuits
316:MUSCULAR
289:DISHFIRE
237:Dropmire
203:Genoa II
132:FAIRVIEW
105:SHAMROCK
89:Pre-1978
84:Programs
3382:10 June
3171:"Genoa"
3155:20 June
2894:16 June
2865:16 June
2835:16 June
2773:16 June
2743:16 June
2595:"TIDES"
2576:16 June
2330:16 June
2090:fas.org
1755:Bibcode
1700:LifeLog
1539:Topsail
1390:History
1376:Privacy
1278:system.
1088:Genisys
1042:action.
1020:Mission
994:Cornell
863:(NSA).
533:Related
321:Tempora
299:ICREACH
279:MAINWAY
264:PINWALE
247:Bullrun
183:OAKSTAR
127:BLARNEY
100:MINARET
95:ECHELON
38:website
3479:
3351:
3324:
3297:9 June
3267:7 June
3114:7 June
3067:
3038:
2798:
2704:
2442:
2410:3 June
2376:
2326:. 2003
2297:6 June
2231:
2201:
2169:7 June
2129:
2099:3 June
1908:
1844:
1775:
1743:Nature
1012:, and
998:Dallas
938:, and
908:INSCOM
895:, and
587:SIGINT
269:MARINA
252:MYSTIC
110:PROMIS
3541:DARPA
3149:(PDF)
3134:(PDF)
3108:(PDF)
3093:(PDF)
2945:Salon
2350:DARPA
2163:DARPA
2155:(PDF)
1842:S2CID
1801:Wired
1647:DARPA
1623:op-ed
1052:Genoa
944:nodes
936:JFCOM
932:SOCOM
877:Genoa
873:DARPA
743:Other
232:PRISM
147:Genoa
3497:link
3477:ISBN
3455:2013
3427:2013
3384:2016
3349:ISBN
3322:ISBN
3299:2016
3269:2016
3239:2013
3211:2013
3157:2016
3116:2016
3065:ISSN
3036:ISBN
3012:2013
2982:2013
2953:2013
2896:2016
2867:2016
2837:2016
2796:ISBN
2775:2016
2745:2016
2702:ISBN
2578:2016
2440:ISBN
2412:2016
2374:ISBN
2332:2016
2299:2016
2229:ISBN
2199:ISBN
2171:2016
2127:ISBN
2101:2016
2071:2013
2034:2013
2003:2013
1968:2013
1940:2013
1906:ISBN
1874:2013
1809:2013
1773:PMID
1652:The
1625:for
1585:and
1568:SAIC
1518:and
1399:Adm.
1318:The
1307:The
1260:gait
1181:NIST
940:JWAC
924:CIFA
838:for
756:DGSE
737:GCSB
713:GCHQ
701:CSEC
392:FISC
354:ECPA
349:FISA
1902:221
1834:doi
1763:doi
1747:451
1649:".
1370:DNA
1286:'s
1010:MIT
920:CIA
916:DIA
912:NSA
813:TIA
768:BND
725:ASD
680:IAO
670:DHS
660:CIA
650:FBI
640:DOJ
620:CSS
3532::
3493:}}
3489:{{
3463:^
3444:.
3417:.
3400:,
3372:.
3290:.
3286:.
3259:.
3255:.
3228:.
3199:.
3177:.
3173:.
3140:.
3136:.
3099:.
3095:.
3063:.
3059:.
3014:.
3003:.
2984:.
2973:.
2942:.
2919:.
2915:.
2904:^
2887:.
2883:.
2858:.
2854:.
2823:.
2819:.
2765:.
2761:.
2731:.
2727:.
2716:^
2686:^
2665:.
2652:^
2631:.
2618:^
2597:.
2586:^
2564:.
2560:.
2531:.
2518:^
2497:.
2467:.
2454:^
2420:^
2400:.
2388:^
2348:.
2322:.
2318:.
2307:^
2290:.
2286:.
2270:^
2259:,
2243:^
2213:^
2179:^
2161:.
2157:.
2141:^
2109:^
2092:.
2088:.
2060:.
2046:^
2036:.
2022:.
2011:^
1992:.
1976:^
1957:.
1928:.
1904:.
1882:^
1863:.
1840:.
1830:52
1828:.
1798:.
1779:.
1771:.
1761:.
1745:.
1741:.
1729:^
1631:,
1596:,
1458:.
1372:.
1187:,
1183:.
1016:.
1008:,
1004:,
1000:,
996:,
992:,
988:,
984:,
980:,
965:,
961:,
954:.
950:,
934:,
930:,
926:,
922:,
918:,
914:,
910:,
891:,
879:,
823:.
3499:)
3485:.
3457:.
3429:.
3386:.
3357:.
3330:.
3301:.
3271:.
3241:.
3213:.
3159:.
3118:.
3077:.
3044:.
2955:.
2898:.
2869:.
2839:.
2804:.
2777:.
2747:.
2710:.
2680:.
2646:.
2612:.
2580:.
2546:.
2512:.
2482:.
2448:.
2414:.
2382:.
2334:.
2301:.
2237:.
2207:.
2173:.
2135:.
2103:.
2073:.
2005:.
1970:.
1942:.
1914:.
1876:.
1848:.
1836::
1811:.
1765::
1757::
811:(
797:e
790:t
783:v
23:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.