Information Awareness Office

Last updated
Information Awareness Office seal
(motto: lat. scientia est potentia - knowledge is power ) IAO-logo.png
Information Awareness Office seal
(motto: lat. scientia est potentiaknowledge is power )

The Information Awareness Office (IAO) was established by the United States Defense Advanced Research Projects Agency (DARPA) in January 2002 to bring together several DARPA projects focused on applying surveillance and information technology to track and monitor terrorists and other asymmetric threats to U.S. national security by achieving "Total Information Awareness" (TIA). [4] [5] [6]

Contents

It was achieved by creating enormous computer databases to gather and store the personal information of everyone in the United States, including personal e-mails, social networks, credit card records, phone calls, medical records, and numerous other sources, without any requirement for a search warrant. [7] The information was then analyzed for suspicious activities, connections between individuals, and "threats". [8] The program also included funding for biometric surveillance technologies that could identify and track individuals using surveillance cameras and other methods. [8]

Following public criticism that the technology's development and deployment could lead to a mass surveillance system, the IAO was defunded by Congress in 2003. However, several IAO projects continued to be funded under different names, as revealed by Edward Snowden during the course of the 2013 mass surveillance disclosures. [5] [6] [9] [10] [11] [12]

History

Diagram of Total Information Awareness system, taken from official (decommissioned) Information Awareness Office website (click to enlarge) Total Information Awareness -- system diagram.gif
Diagram of Total Information Awareness system, taken from official (decommissioned) Information Awareness Office website (click to enlarge)

The IAO was established after Admiral John Poindexter, former United States National Security Advisor to President Ronald Reagan, and SAIC executive Brian Hicks approached the US Department of Defense with the idea for an information awareness program after the attacks of September 11, 2001. [11]

Poindexter and Hicks had previously worked together on intelligence-technology programs for the Defense Advanced Research Projects Agency. DARPA agreed to host the program and appointed Poindexter to run it in 2002.

The IAO began funding research and development of the Total Information Awareness (TIA) Program in February 2003 but renamed the program the Terrorism Information Awareness Program in May that year after an adverse media reaction to the program's implications for public surveillance. Although TIA was only one of several IAO projects, many critics and news reports conflated TIA with other related research projects of the IAO, with the result that TIA came in popular usage to stand for an entire subset of IAO programs.

The TIA program itself was the "systems-level" program of the IAO that intended to integrate information technologies into a prototype system to provide tools to better detect, classify, and identify potential terrorists with the goal to increase the probability that authorized agencies of the United States could preempt adverse actions. [13]

As a systems-level program of programs, TIA's goal was the creation of a "counter-terrorism information architecture" that integrated technologies from other IAO programs (and elsewhere, as appropriate). The TIA program was researching, developing, and integrating technologies to virtually aggregate data, to follow subject-oriented link analysis, to develop descriptive and predictive models through data mining or human hypothesis, and to apply such models to additional datasets to identify terrorists and terrorist groups. [13]

Among the other IAO programs that were intended to provide TIA with component data aggregation and automated analysis technologies were the Genisys, Genisys Privacy Protection, Evidence Extraction and Link Discovery, and Scalable Social Network Analysis programs.

On August 2, 2002, Poindexter gave a speech at DARPAtech 2002 entitled "Overview of the Information Awareness Office" [14] in which he described the TIA program.

In addition to the program itself, the involvement of Poindexter as director of the IAO also raised concerns among some, since he had been earlier convicted of lying to Congress and altering and destroying documents pertaining to the Iran-Contra Affair, although those convictions were later overturned on the grounds that the testimony used against him was protected.

On January 16, 2003, Senator Russ Feingold introduced legislation to suspend the activity of the IAO and the Total Information Awareness program pending a Congressional review of privacy issues involved. [15] A similar measure introduced by Senator Ron Wyden would have prohibited the IAO from operating within the United States unless specifically authorized to do so by Congress, and would have shut the IAO down entirely 60 days after passage unless either the Pentagon prepared a report to Congress assessing the impact of IAO activities on individual privacy and civil liberties or the President certified the program's research as vital to national security interests. In February 2003, Congress passed legislation suspending activities of the IAO pending a Congressional report of the office's activities (Consolidated Appropriations Resolution, 2003, No.108–7, Division M, §111(b) [signed Feb. 20, 2003]).

In response to this legislation, DARPA provided Congress on May 20, 2003 with a report on its activities. [16] In this report, IAO changed the name of the program to the Terrorism Information Awareness Program and emphasized that the program was not designed to compile dossiers on US citizens, but rather to research and develop the tools that would allow authorized agencies to gather information on terrorist networks. Despite the name change and these assurances, the critics continued to see the system as prone to potential misuse or abuse. [13]

As a result, House and Senate negotiators moved to prohibit further funding for the TIA program by adding provisions to the Department of Defense Appropriations Act, 2004 [17] (signed into law by President Bush on October 1, 2003). Further, the Joint Explanatory Statement included in the conference committee report specifically directed that the IAO as program manager for TIA be terminated immediately. [18]

Research

IAO research was conducted along five major investigative paths: secure collaboration problem solving; structured discovery; link and group understanding; context aware visualization; and decision making with corporate memory.

Among the IAO projects were:

Human Identification at a Distance (HumanID)

Diagram (from official IAO site) describing capabilities of the "Human Identification at a Distance (HumanID)" project Human-id-at-a-distance.gif
Diagram (from official IAO site) describing capabilities of the "Human Identification at a Distance (HumanID)" project

The Human Identification at a Distance (HumanID) project developed automated biometric identification technologies to detect, recognize and identify humans at great distances for "force protection", crime prevention, and "homeland security/defense" purposes. [19]

Its goals included programs to: [19]

Evidence Extraction and Link Discovery (EELD) developed technologies and tools for automated discovery, extraction and linking of sparse evidence contained in large amounts of classified and unclassified data sources (such as phone call records from the NSA call database, internet histories, or bank records). [20]

EELD was designed to design systems with the ability to extract data from multiple sources (e.g., text messages, social networking sites, financial records, and web pages). It was to develop the ability to detect patterns comprising multiple types of links between data items or people communicating (e.g., financial transactions, communications, travel, etc.). [20]

It is designed to link items relating potential "terrorist" groups and scenarios, and to learn patterns of different groups or scenarios to identify new organizations and emerging threats. [20]

Genisys

Goals of the Genysis project Genysis.gif
Goals of the Genysis project

Genisys aimed at developing technologies which would enable "ultra-large, all-source information repositories". [21]

Vast amounts of information were going to be collected and analyzed, and the available database technology at the time was insufficient for storing and organizing such enormous quantities of data. So they developed techniques for virtual data aggregation in order to support effective analysis across heterogeneous databases, as well as unstructured public data sources, such as the World Wide Web. "Effective analysis across heterogenous databases" means the ability to take things from databases which are designed to store different types of data—such as a database containing criminal records, a phone call database and a foreign intelligence database. The World Wide Web is considered an "unstructured public data source" because it is publicly accessible and contains many different types of data—such as blogs, emails, records of visits to web sites, etc.—all of which need to be analyzed and stored efficiently. [21]

Another goal was to develop "a large, distributed system architecture for managing the huge volume of raw data input, analysis results, and feedback, that will result in a simpler, more flexible data store that performs well and allows us to retain important data indefinitely." [21]

Genisys had an internal "Privacy Protection Program." It was intended to restrict analysts' access to irrelevant information on private U.S. citizens, enforce privacy laws and policies via software mechanisms, and report misuse of data. [22]

Scalable Social Network Analysis

Scalable Social Network Analysis (SSNA) aimed at developing techniques based on social network analysis for modeling the key characteristics of terrorist groups and discriminating these groups from other types of societal groups. [23]

Sean McGahan, of Northeastern University said the following in his study of SSNA:

The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.

Sean McGahan [23]

Futures Markets Applied to Prediction (FutureMAP)

Futures Markets Applied to Prediction (FutureMAP) was intended to harness collective intelligence by researching prediction market techniques for avoiding surprise and predicting future events. The intent was to explore the feasibility of market-based trading mechanisms to predict political instability, threats to national security, and other major events in the near future. [24] In layman's terms, FutureMap would be a website that allowed people to bet on when a terrorist attack would occur. [25] The bookmaker would have been the federal government. [25] Several Senators were outraged at the very notion of such a program. [25] Then Senate Minority Leader Tom Daschle said on the floor of the Senate "I couldn't believe that we would actually commit $8 million to create a Web site that would encourage investors to bet on futures involving terrorist attacks and public assassinations. ... I can't believe that anybody would seriously propose that we trade in death. ... How long would it be before you saw traders investing in a way that would bring about the desired result?" [25] Democratic Senator from Oregon, Ron Wyden said, "The idea of a federal betting parlor on atrocities and terrorism is ridiculous and it's grotesque." [25] The ranking Democrat on the Armed Services Committee, Sen. Carl Levin of Michigan, thought the program was so ridiculous that he thought initial reports of it were the result of a hoax. [25] The program was then dropped.

TIDES

Goals of the Translingual Information Detection, Extraction and Summarization (TIDES) project TIDES.gif
Goals of the Translingual Information Detection, Extraction and Summarization (TIDES) project

Translingual Information Detection, Extraction and Summarization (TIDES) developed advanced language processing technology to enable English speakers to find and interpret critical information in multiple languages without requiring knowledge of those languages. [26]

Outside groups (such as universities, corporations, etc.) were invited to participate in the annual information retrieval, topic detection and tracking, automatic content extraction, and machine translation evaluations run by NIST. [26]

Genoa / Genoa II

Genoa and Genoa II focused on providing advanced decision-support and collaboration tools to rapidly deal with and adjust to dynamic crisis management and allow for inter-agency collaboration in real-time. [27] [28] Another function was to be able to make estimates of possible future scenarios to assist intelligence officials in deciding what to do, [29] in a manner similar to the DARPA's Deep Green program which is designed to assist Army commanders in making battlefield decisions.

Wargaming the Asymmetric Environment (WAE)

Wargaming the Asymmetric Environment (WAE) focused on developing automated technology capable of identifying predictive indicators of terrorist activity or impending attacks by examining individual and group behavior in broad environmental context and examining the motivation of specific terrorists. [30]

Effective Affordable Reusable Speech-to-text (EARS)

Graphic from the Information Awareness Office's website describing the goals of the Effective, Affordable, Reusable Speech-to-Text (EARS) project EARS.gif
Graphic from the Information Awareness Office's website describing the goals of the Effective, Affordable, Reusable Speech-to-Text (EARS) project

Effective Affordable Reusable Speech-to-text (EARS) developed automatic speech-to-text transcription technology whose output is substantially richer and much more accurate than previously possible. The aim of EARS was to focus on everyday human-to-human speech from broadcasts and telephone conversations in multiple languages. [31] It is expected to increase the speed with which speech can be processed by computers by 100 times or more. [29]

The intent is to create a core enabling technology (technology that is used as a component for future technologies) suitable for a wide range of future surveillance applications. [31]

Babylon

Babylon aimed to develop rapid, two-way, natural language speech translation interfaces and platforms. Its goal was to help the warfighter in field environments to complete tasks such as force protection, refugee processing, and medical triage. [32]

Bio-Surveillance

Bio-Surveillance aimed to develop the necessary information technologies and resulting prototype capable of detecting the covert release of a biological pathogen automatically, and significantly earlier than traditional approaches. [33]

Communicator

Diagram (from official IAO site) describing capabilities of the "Communicator" project Total Information Awareness -- Communicator diagram.gif
Diagram (from official IAO site) describing capabilities of the "Communicator" project

Communicator was to develop "dialogue interaction" technology that enables warfighters to talk with computers, such that information will be accessible on the battlefield or in command centers without ever having to touch a keyboard. The Communicator Platform was to be both wireless and mobile, and to be designed to function in a networked environment. [34]

The dialogue interaction software was to interpret the context of the dialogue in order to improve performance, and to be capable of automatically adapting to new topics (because situations quickly change in war) so conversation is natural and efficient. The Communicator program emphasized task knowledge to compensate for natural language effects and noisy environments. Unlike automated translation of natural language speech, which is much more complex due to an essentially unlimited vocabulary and grammar, the Communicator program is directed task specific issues so that there are constrained vocabularies (the system only needs to be able to understand language related to war). Research was also started to focus on foreign language computer interaction for use in supporting coalition operations. [34]

Live exercises were conducted involving small unit logistics operations involving the United States Marines to test the technology in extreme environments. [34]

Components of TIA projects that continue to be developed

Despite the withdrawal of funding for the TIA and the closing of the IAO, the core of the project survived. [11] [12] [35] Legislators included a classified annex to the Defense Appropriations Act that preserved funding for TIA's component technologies, if they were transferred to other government agencies. TIA projects continued to be funded under classified annexes to Defense and Intelligence appropriation bills. However, the act also stipulated that the technologies be used only for military or foreign intelligence purposes involving foreigners. [36]

TIA's two core projects are now operated by Advanced Research and Development Activity (ARDA) located among the 60-odd buildings of "Crypto City" at NSA headquarters in Fort Meade, MD. ARDA itself has been shifted from the NSA to the Disruptive Technology Office (run by the Director of National Intelligence). They are funded by National Foreign Intelligence Program for foreign counterterrorism intelligence purposes.

One technology, codenamed "Basketball", is the Information Awareness Prototype System, the core architecture to integrate all the TIA's information extraction, analysis, and dissemination tools. Work on this project is conducted by SAIC through its former Hicks & Associates consulting arm, and run by former Defense and military officials and which had originally been awarded US$19 million IAO contract to build the prototype system in late 2002. [37]

The other project has been re-designated "Topsail" (formerly Genoa II) and would provide IT tools to help anticipate and preempt terrorist attacks. SAIC has also been contracted to work on Topsail, including a US$3.7 million contract in 2005.

Media coverage and criticism

The first mention of the IAO in the mainstream media came from The New York Times reporter John Markoff on February 13, 2002. [38] Initial reports contained few details about the program. In the following months, as more information emerged about the scope of the TIA project, civil libertarians became concerned over what they saw as the potential for the development of an Orwellian mass surveillance system.

On November 14, 2002, The New York Times published a column by William Safire in which he claimed "[TIA] has been given a $200 million budget to create computer dossiers on 300 million Americans." [39] Safire has been credited with triggering the anti-TIA movement. [40]

See also

Related Research Articles

<span class="mw-page-title-main">John Poindexter</span> Retired American naval officer and Department of Defense official

John Marlan Poindexter is a retired United States naval officer and Department of Defense official. He was Deputy National Security Advisor and National Security Advisor during the Reagan administration. He was convicted in April 1990 of multiple felonies as a result of his actions in the Iran–Contra affair, but his convictions were reversed on appeal in 1991. During the George W. Bush administration, he served a brief stint as the director of the DARPA Information Awareness Office. He is the father of NASA astronaut and U.S. Navy Captain Alan G. Poindexter.

<span class="mw-page-title-main">Surveillance</span> Monitoring something for the purposes of influencing, protecting, or suppressing it

Surveillance is the monitoring of behavior, many activities, or information for the purpose of information gathering, influencing, managing, or directing. This can include observation from a distance by means of electronic equipment, such as closed-circuit television (CCTV), or interception of electronically transmitted information like Internet traffic. It can also include simple technical methods, such as human intelligence gathering and postal interception.

Computer and network surveillance is the monitoring of computer activity and data stored locally on a computer or data being transferred over computer networks such as the Internet. This monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agencies. Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored.

<span class="mw-page-title-main">Total Information Awareness</span> US mass detection program

Total Information Awareness (TIA) was a mass detection program by the United States Information Awareness Office. It operated under this title from February to May 2003 before being renamed Terrorism Information Awareness.

Combat Zones That See, or CTS, is a project of the United States Defense Advanced Research Projects Agency (DARPA) whose goal is to "track everything that moves" in a city by linking up a massive network of surveillance cameras to a centralized computer system. Artificial intelligence software will then identify and track all vehicle movement throughout the city.

The Policy Analysis Market (PAM), part of the FutureMAP project, was a proposed futures exchange developed, beginning in May 2001, by the Information Awareness Office (IAO) of the United States Defense Advanced Research Projects Agency (DARPA), and based on an idea first proposed by Net Exchange, a San Diego, California, research firm specializing in the development of online prediction markets. PAM was shut down in August 2003 after multiple US senators condemned it as an assassination and terrorism market, a characterization criticized in turn by futures-exchange expert Robin Hanson of George Mason University, and several journalists. Since PAM's closure, several private-sector variations on the idea have been launched.

<span class="mw-page-title-main">Mass surveillance</span> Intricate surveillance of an entire or a substantial fraction of a population

Mass surveillance is the intricate surveillance of an entire or a substantial fraction of a population in order to monitor that group of citizens. The surveillance is often carried out by local and federal governments or governmental organizations, but it may also be carried out by corporations. Depending on each nation's laws and judicial systems, the legality of and the permission required to engage in mass surveillance varies. It is the single most indicative distinguishing trait of totalitarian regimes. It is often distinguished from targeted surveillance.

The Multistate Anti-Terrorism Information Exchange Program, also known by the acronym MATRIX, was a U.S. federally funded data mining system originally developed for the Florida Department of Law Enforcement described as a tool to identify terrorist subjects.

Policy appliances are technical control and logging mechanisms to enforce or reconcile policy rules and to ensure accountability in information systems. Policy appliances can be used to enforce policy or other systems constraints within and among trusted systems.

<span class="mw-page-title-main">Project Genoa</span>

Project Genoa was a software project commissioned by the United States' DARPA which was designed to analyze large amounts of data and metadata to help human analysts counter terrorism.

Counterintelligence Field Activity (CIFA) was a United States Department of Defense (DoD) agency whose size and budget were classified. The CIFA was created by a directive from the Secretary of Defense, then Donald Rumsfeld, on February 19, 2002. On August 8, 2008, it was announced that CIFA would be shut down. The Defense Intelligence Agency (DIA) absorbed most of the components and authorities of the CIFA into the Defense Counterintelligence and Human Intelligence Center, which was later consolidated into the Defense Clandestine Service.

ADVISE is a research and development program within the United States Department of Homeland Security (DHS) Threat and Vulnerability Testing and Assessment (TVTA) portfolio. It is reportedly developing a massive data mining system, which would collect and analyze data on everyone in the United States and perform a "threat analysis" on them. The data can be anything from financial records, phone records, emails, blog entries, website searches, to any other electronic information that can be put into a computer system. This information is then analyzed, and used to monitor social threats such as community-forming, terrorism, political organizing, or crime.

<span class="mw-page-title-main">Disruptive Technology Office</span>

The Disruptive Technology Office (DTO) was a funding agency within the United States Intelligence Community. It was previously known as the Advanced Research and Development Activity (ARDA). In December 2007, DTO was folded into the newly created IARPA.

K. A. (Kim) Taipale is a Finnish-American investor and legal scholar specializing in information, technology, and national security policy. He is a partner in Stilwell Holding, a private investment firm, a director of the Stilwell Charitable Fund, and the former chairman of the executive committee of Kobra International Ltd.

Investigative Data Warehouse (IDW) is a searchable database operated by the FBI. It was created in 2004. Much of the nature and scope of the database is classified. The database is a centralization of multiple federal and state databases, including criminal records from various law enforcement agencies, the U.S. Department of the Treasury's Financial Crimes Enforcement Network (FinCEN), and public records databases. According to Michael Morehart's testimony before the House Committee on Financial Services in 2006, the "IDW is a centralized, web-enabled, closed system repository for intelligence and investigative data. This system, maintained by the FBI, allows appropriately trained and authorized personnel throughout the country to query for information of relevance to investigative and intelligence matters."

Saffron Technology, Inc., was a technology company headquartered in Cary, North Carolina, that developed cognitive computing systems. Their systems use incremental learning to understand and unify by entity the connections between an entity and other “things” in data, along with the context of their connections and their raw frequency counts. Saffron learns from all sources of data including structured and unstructured data to support knowledge-based decision making. Its patented technology captures the connections between data points at the entity level and stores these connections in an associative memory. Similarity algorithms and predictive analytics are then combined with the associative index to identify patterns in the data. Saffron’s Natural Intelligence platform was utilized across industries including manufacturing, energy, defense and healthcare, to help decision-makers manage risks, identify opportunities and anticipate future outcomes, thus reducing cost and increasing productivity. Its competitors include IBM Watson and Grok. Intel purchased the company in 2015, then shuttered it less than 3 years later.

<span class="mw-page-title-main">Mass surveillance in the United States</span>

The practice of mass surveillance in the United States dates back to wartime monitoring and censorship of international communications from, to, or which passed through the United States. After the First and Second World Wars, mass surveillance continued throughout the Cold War period, via programs such as the Black Chamber and Project SHAMROCK. The formation and growth of federal law-enforcement and intelligence agencies such as the FBI, CIA, and NSA institutionalized surveillance used to also silence political dissent, as evidenced by COINTELPRO projects which targeted various organizations and individuals. During the Civil Rights Movement era, many individuals put under surveillance orders were first labelled as integrationists, then deemed subversive, and sometimes suspected to be supportive of the communist model of the United States' rival at the time, the Soviet Union. Other targeted individuals and groups included Native American activists, African American and Chicano liberation movement activists, and anti-war protesters.

<i>The Watchers: The Rise of Americas Surveillance State</i> 2010 book by Shane Harris

The Watchers: The Rise of America's Surveillance State is a non-fiction book by American journalist Shane Harris, published in 2010. It details the rise of surveillance programs in the U.S. Author Harris had previously served as a writer for outfits such as Foreign Policy, National Journal, and The Washingtonian.

<span class="mw-page-title-main">Project Genoa II</span>

Project Genoa II was a software project that originated with the United States Defense Advanced Research Projects Agency's Information Awareness Office and the successor to the Genoa program. Originally part of DARPA's wider Total Information Awareness project, it was later renamed Topsail and handed over to the Advanced Research and Development Activity for further development.

References

  1. "Information Awareness Office". DARPA. Archived from the original on 2 August 2002.
  2. Tim Dowling. "What does the Prism logo mean?". The Guardian . Retrieved 30 November 2013. The Prism logo is slightly more opaque than the one used by the US government's Information Awareness Office, which boasted an all-seeing eye atop a pyramid, casting a golden light across an adjacent planet Earth.
  3. Hendrik Hertzberg (December 9, 2002). "Too Much Information". The New Yorker . Retrieved 30 November 2013. The Information Awareness Office's official seal features an occult pyramid topped with mystic all-seeing eye, like the one on the dollar bill. Its official motto is "Scientia Est Potentia," which doesn't mean "science has a lot of potential." It means "knowledge is power."
  4. Jonathan Turley (November 17, 2002). "George Bush's Big Brother". The Los Angeles Times . Retrieved 19 December 2013.
  5. 1 2 James Poulos. "Obama Administration Anti-Leak Scheme Shows Precrime and Total Information Awareness Go Hand In Hand". Forbes . Retrieved 19 October 2013.
  6. 1 2 John Horgan. "U.S. Never Really Ended Creepy "Total Information Awareness" Program". Scientific American . Retrieved 19 October 2013.
  7. John Markoff (November 22, 2002). "Pentagon Plans a Computer System That Would Peek at Personal Data of Americans". The New York Times.
  8. 1 2 Total Information Awareness (TIA), Electronic Privacy Information Center (EPIC)
  9. Dismantling the Empire: America's Last Best Hope By Chalmers Johnson ISBN   0-8050-9303-6 "Congress's action did not end the Total Information Awareness program. The National Security Agency secretly decided to continue it through its private contractors."
  10. "Total/Terrorism Information Awareness (TIA): Is It Truly Dead?". Electronic Frontier Foundation (official website). 2003. Archived from the original on 2009-03-25. Retrieved 2009-03-15.
  11. 1 2 3 Harris, Shane (Feb 23, 2006). "TIA Lives On". National Journal. Archived from the original on May 28, 2011. Retrieved 2009-03-16.
  12. 1 2 "U.S. Still Mining Terror Data". Wired News. February 23, 2004.
  13. 1 2 3 Lundin, Leigh (7 July 2013). "Pam, Prism, and Poindexter". Spying. Washington: SleuthSayers. Retrieved 4 January 2014.
  14. Overview of the Information Awareness Office
  15. "Search Results - THOMAS (Library of Congress)". Archived from the original on 2006-04-24. Retrieved 2006-03-03.
  16. The Global Information Society Project
  17. Department of Defense Appropriations Act, 2004, Pub. L. No. 108–87, § 8131, 117 Stat. 1054, 1102 (2003)
  18. 149 Cong. Rec. H8755—H8771 (24 September 2003)
  19. 1 2 3 "Human Identification at a distance". Information Awareness Office (official website -- mirror). Archived from the original on February 15, 2009. Retrieved 2009-03-15.
  20. 1 2 3 "Evidence Extraction and Link Discovery". Information Awareness Office (official website -- mirror). Archived from the original on 2009-02-15. Retrieved 2009-03-15.
  21. 1 2 3 "Genisys". Information Awareness Office (official website). Archived from the original on 2009-02-16. Retrieved 2009-03-15.
  22. Lee, Newton (7 April 2015). Counterterrorism and Cybersecurity: Total Information Awareness (2, illustrated, revised ed.). Springer. p. 141. ISBN   9783319172446.
  23. 1 2 Ethier, Jason. "Current Research in Social Network Theory". Northeastern University College of Computer and Information Science. Archived from the original on February 26, 2015. Retrieved 2009-03-15.
  24. FutureMap Archived 2006-02-05 at the Wayback Machine
  25. 1 2 3 4 5 6 CNN
  26. 1 2 "TIDES". Information Awareness Office (official website -- mirror). Archived from the original on 2009-02-15. Retrieved 2009-03-15.
  27. "Genoa". Information Awareness Office (official website). Archived from the original on 2009-02-16. Retrieved 2009-03-15.
  28. "Genoa II". Information Awareness Office (official website). Archived from the original on 2009-02-15. Retrieved 2009-03-15.
  29. 1 2 Belasco, Amy (January 21, 2003). "EFF: Memorandum Regarding TIA Funding". Electronic Frontier Foundation. Archived from the original on April 29, 2017. Retrieved 2009-03-15.
  30. "Wargaming the Asymmetric Environment (WAE)". www.darpa.mil/iao. Information Awareness Office. Archived from the original on 28 May 2012. Retrieved 16 June 2016.
  31. 1 2 "EARS". Information Awareness Office (official website -- mirror). Archived from the original on 2009-05-07. Retrieved 2009-03-15.
  32. Babylon Archived 2006-07-15 at the Wayback Machine
  33. BSS Archived 2006-09-19 at the Wayback Machine
  34. 1 2 3 "Communicator". Information Awareness Office (official website). Archived from the original on 2009-02-15. Retrieved 2009-03-15.
  35. Wanted: Competent Big Brothers Archived 2008-05-17 at the Wayback Machine , Newsweek, 8 February 2006, retrieved 27 July 2007
  36. The Total Information Awareness Project Lives On, Technology Review, 26 April 2006, retrieved 27 July 2007
  37. TIA Lives On, National Journal, 23 February 2006, retrieved 27 July 2007
  38. Markoff, John (February 13, 2002). "Chief Takes Over at Agency To Thwart Attacks on U.S". The New York Times. Retrieved May 5, 2010.
  39. Safire, William (2002-11-14). "You Are a Suspect". The New York Times. p. 2. Retrieved 2010-10-21.
  40. Big Brother ...

Further reading

Media coverage

Academic articles

Critical views

Proponent views

Accord:

Also: