Read Playing to the Edge: American Intelligence in the Age of Terror Online
Authors: Michael V. Hayden
Panetta appointed director of,
358
,
361
–65
past activities made public,
120
,
218
relationship between DNI and director of,
168
,
178
relationship between ODNI and,
164
–65
rendition, detention, and interrogation (RDI) program of,
see
rendition, detention, and interrogation program
Science and Technology division of,
285
,
297
,
300
station chiefs of, as DNI’s representative,
170
–71
subsidiary operation proposed for,
286
Chalabi, Ahmed,
200
Cheney, Dick,
24
,
50
,
256
,
371
,
376
,
402
Chertoff, Mike,
404
Chertoff Group,
404
Chinese Ministry of State Security (MSS),
277
Church, Frank,
3
Churchill, Winston,
127
Civil War,
49
–50,
135
,
136
–37,
200
Clapper, Jim,
32
,
158
,
168
,
169
,
175
–76,
177
,
408
–9,
414
,
419
Clark, Helen,
35
Clemente, Roberto,
244
Clinton, Hillary,
185
close fight vs. deep fight,
342
Collins, Susan,
158
Collins-Lieberman Intelligence Reform and Terrorism Prevention Act of 2004,
158
,
169
,
178
Colombia,
324
–25
Complete Guide to What Is Wrong with the NIE,
299
Comprehensive National Cybersecurity Initiative,
177
computer network attack (CNA),
140
,
142
computer network defense (CND),
140
–41
computer network exploitation (CNE),
140
,
141
–42
computer network operations (CNO),
140
–42
Confront and Conceal
(Sanger),
370
Congressional Quarterly,
226
consent of the governed,
422
Conservative Political Action Conference (CPAC),
430
–31
Bill of Rights in,
430
cruel and inhumane treatment and,
235
First Amendment to,
114
,
117
,
125
,
126
Fourth Amendment to,
10
,
68
–69,
82
,
105
,
411
,
413
,
415
contractors and outsourcing,
287
–88,
317
Convention Against Torture,
188
,
235
Council on Foreign Relations,
119
,
219
–20
counter adversary use of the Internet (CAUI),
148
–49
Counterintelligence Center (CIC),
277
–78,
296
counterproliferation,
290
counterterrorism (CT),
43
,
49
,
116
,
117
,
149
,
177
,
290
,
312
,
327
,
342
,
343
,
369
,
425
CIA Counterterrorism Center (CTC),
177
n,
238
,
300
,
361
,
389
,
390
,
394
National Counterterrorism Center (NCTC),
177
Covert Action Review Group (CARG),
283
–84
covert actions,
211
,
226
,
283
,
288
,
373
,
374
,
382
,
427
Craig, Greg,
341
,
358
,
365
,
367
,
368
interrogation memos and,
378
–82,
384
,
387
creation mythology,
316
Crocker, Ryan,
215
Crumpton, Hank,
122
see also
Internet
Danner, Mark,
232
Darfur,
283
data,
133
metadata,
24
,
25
,
30
,
66
–69,
75
,
78
,
90
,
94
,
370
,
403
,
406
–8,
408
n,
410
,
420
Davis, James T.,
62
Dawa Party,
198
deep fight vs. close fight,
342
Defense Authorization Bill,
160
Defense Intelligence Agency (DIA),
167
Deitz, Bob,
68
–70,
71
,
73
,
97
–98,
285
democracy,
426
–28
Dershowitz, Alan,
418
–20
detainees,
231
–33,
366
,
384
–86,
398
–400
Detainee Treatment Act and,
188
at Guantánamo,
82
,
191
,
193
,
221
,
222
,
231
–32,
237
,
239
,
367
,
385
high-value detainee (HVD) program,
223
interrogation of,
see
interrogations
Detainee Treatment Act,
236
Detroit underwear bomber,
173
,
175
Diamond, John,
108
Diego Garcia,
222
director of Central Intelligence (DCI),
155
,
156
,
358
director of National Intelligence (DNI),
153
–78,
358
CIA director’s relationship with,
168
,
178
CIA station chiefs as representative of,
170
–71
Executive Order 12333 and,
169
–70
National Counterterrorism Center of,
177
Donovan, William “Wild Bill,”
329
,
333
drones,
see
unmanned aerial vehicles
Drug Enforcement Administration,
167
Duquesne University,
246
–47,
250
–54
Durand, Mortimer,
209
Durham, John,
241
,
242
,
393
,
395
,
396
,
400
Durzhavna Sigurnost (DS),
314
Dylan, Bob,
271
Eagleburger, Larry,
212
Eddy, Bill,
321
Edison, Thomas,
239
Egypt,
318
–20
Elfman, Mary,
180
Eligible Receiver exercise,
137
–38
Emmel, Judy,
64
Enemy of the State,
10
enhanced interrogation techniques (EITs),
173
,
223
,
225
,
237
,
238
,
381
,
386
,
391
Ensor, Kemp,
28
espionage,
426
–27
democracy and,
426
–27
George Washington and,
427
,
429
,
431
warfare vs.,
136
European Parliament,
4
European Union (EU),
220
–21
EXCOM,
171
Executive Order 12333,
169
–70
explosively formed projectiles (EFPs),
293
Face the Nation,
425
Fair Game
(Plame),
122
Fakhrizadeh, Mohsen,
308
Family Battle Rhythms,
62
Family Jewels
(Central Intelligence Agency),
120
Farkus, Cindy,
27
Faurer, Linc,
131
Federal Bureau of Investigation (FBI),
26
,
34
,
44
,
66
,
74
–76,
85
,
164
,
167
,
278
,
326
,
356
,
360
Federally Administered Tribal Areas (FATA),
335
,
342
,
344
–48
Federal Register,
236
Feinstein, Dianne,
122
,
227
,
234
,
361
,
364
,
391
SSCI report on CIA detention and interrogation program,
396
–402
Fielding, Fred,
355
Fingar, Tom,
162
Finifter, Cindy,
28
First Amendment,
114
,
117
,
125
,
126
Five Eyes,
33
–35
Flynn, Mike
425
Foggo, Kyle Dustin “Dusty,”
179
Fogleman, Ron,
128
Foote, Shelby,
227
Ford, Carl,
50
Ford, Gerald,
157
Foreign Affairs,
129
Foreign Affairs Directorate,
14
Foreign Intelligence Surveillance Act (FISA),
67
–69,
71
,
73
,
77
,
80
–83,
89
,
90
,
96
,
97
,
106
–9,
112
,
177
,
406
,
424
foreign satellite (FORNSAT),
21
–22
Fort Meade,
28
–29,
31
,
40
,
41
,
139
–40
Fourth Amendment,
10
,
68
–69,
82
,
105
,
411
,
413
,
415
Freedom Act,
408
n
freedom and liberty,
65
,
76
,
113
,
430
Freedom of Information Act (FOIA),
378
–79,
397
Freeman, Chas,
173
Friday Night Lights
(Bissinger),
375
Friedman, William and Elizebeth,
2
–3
Frist, Tom,
86
G8,
312
Gaddafi, Saif al-Islam,
316
,
431
Gates, Bob,
123
,
169
,
176
,
212
,
278
,
303
,
393
,
428
Gaza,
293
Gazprom,
417
NSA annual meetings with,
36
–37
General Intelligence Directorate (GID),
322
,
323
,
324
Iraq and,
61
George III, King,
430
George Mason University (GMU),
404
,
426
–28
Georgia,
310
–12
Germany,
26
,
32
,
204
,
219
,
220
,
415
,
417
Bad Aibling Station in,
417
–18
Munich Security Conference,
416
–17,
418
globalization,
132
Glomar
defense,
423
Golan Heights,
261
Golden Mosque,
195