Playing to the Edge: American Intelligence in the Age of Terror (51 page)

BOOK: Playing to the Edge: American Intelligence in the Age of Terror
7.1Mb size Format: txt, pdf, ePub
ads

Panetta appointed director of,
358
,
361
–65

past activities made public,
120
,
218

relationship between DNI and director of,
168
,
178

relationship between ODNI and,
164
–65

rendition, detention, and interrogation (RDI) program of,
see
rendition, detention, and interrogation program

Science and Technology division of,
285
,
297
,
300

station chiefs of, as DNI’s representative,
170
–71

subsidiary operation proposed for,
286

Chalabi, Ahmed,
200

Cheney, Dick,
24
,
50
,
256
,
371
,
376
,
402

Chertoff, Mike,
404

Chertoff Group,
404

China,
277
,
327
–28,
413
,
420

Chinese Ministry of State Security (MSS),
277

Church, Frank,
3

Church Committee,
3
,
67
,
68
,
408

Churchill, Winston,
127

Civil War,
49
–50,
135
,
136
–37,
200

Clapper, Jim,
32
,
158
,
168
,
169
,
175
–76,
177
,
408
–9,
414
,
419

Clark, Helen,
35

Clemente, Roberto,
244

Clinton, Bill,
174
,
371
,
394

Clinton, Hillary,
185

close fight vs. deep fight,
342

Cohen, Dave,
325
,
326
,
327

Colby, William,
120
,
277
–78

Cold War,
3
–4,
32
,
92
,
154
,
417

Collins, Susan,
158

Collins-Lieberman Intelligence Reform and Terrorism Prevention Act of 2004,
158
,
169
,
178

Colombia,
324
–25

Comey, Jim,
83
–84,
85
,
88
,
90
–91

Complete Guide to What Is Wrong with the NIE,
299

Comprehensive National Cybersecurity Initiative,
177

computer network attack (CNA),
140
,
142

computer network defense (CND),
140
–41

computer network exploitation (CNE),
140
,
141
–42

computer network operations (CNO),
140
–42

Confront and Conceal
(Sanger),
370

Congressional Quarterly,
226

consent of the governed,
422

Conservative Political Action Conference (CPAC),
430
–31

Constitution,
24
,
90
,
112

Bill of Rights in,
430

cruel and inhumane treatment and,
235

First Amendment to,
114
,
117
,
125
,
126

Fourth Amendment to,
10
,
68
–69,
82
,
105
,
411
,
413
,
415

contractors and outsourcing,
287
–88,
317

Convention Against Torture,
188
,
235

Council on Foreign Relations,
119
,
219
–20

counter adversary use of the Internet (CAUI),
148
–49

Counterintelligence Center (CIC),
277
–78,
296

counterproliferation,
290

counterterrorism (CT),
43
,
49
,
116
,
117
,
149
,
177
,
290
,
312
,
327
,
342
,
343
,
369
,
425

CIA Counterterrorism Center (CTC),
177
n,
238
,
300
,
361
,
389
,
390
,
394

National Counterterrorism Center (NCTC),
177

Covert Action Review Group (CARG),
283
–84

covert actions,
211
,
226
,
283
,
288
,
373
,
374
,
382
,
427

Craig, Greg,
341
,
358
,
365
,
367
,
368

interrogation memos and,
378
–82,
384
,
387

creation mythology,
316

Crocker, Ryan,
215

Crumpton, Hank,
122

Culper Ring,
427
,
431

cyber domain,
127
–52,
177

see also
Internet

Danner, Mark,
232

Darfur,
283

data,
133

metadata,
24
,
25
,
30
,
66
–69,
75
,
78
,
90
,
94
,
370
,
403
,
406
–8,
408
n,
410
,
420

Davis, James T.,
62

Dawa Party,
198

deep fight vs. close fight,
342

Defense Authorization Bill,
160

Defense Intelligence Agency (DIA),
167

Deitz, Bob,
68
–70,
71
,
73
,
97
–98,
285

democracy,
426
–28

Dershowitz, Alan,
418
–20

detainees,
231
–33,
366
,
384
–86,
398
–400

Detainee Treatment Act and,
188

at Guantánamo,
82
,
191
,
193
,
221
,
222
,
231
–32,
237
,
239
,
367
,
385

high-value detainee (HVD) program,
223

interrogation of,
see
interrogations

Red Cross and,
231
–32,
381

Detainee Treatment Act,
236

Detroit underwear bomber,
173
,
175

Deutch, John,
383
,
394

Diamond, John,
108

Diego Garcia,
222

director of Central Intelligence (DCI),
155
,
156
,
358

director of National Intelligence (DNI),
153
–78,
358

CIA director’s relationship with,
168
,
178

CIA station chiefs as representative of,
170
–71

Executive Order 12333 and,
169
–70

National Counterterrorism Center of,
177

Donilon, Tom,
380
,
382
,
383

Donovan, William “Wild Bill,”
329
,
333

Drake, Thomas,
22
,
24
,
26
,
125

drones,
see
unmanned aerial vehicles

Drug Enforcement Administration,
167

Duquesne University,
246
–47,
250
–54

Durand, Mortimer,
209

Durand Line,
209
,
349

Durham, John,
241
,
242
,
393
,
395
,
396
,
400

Durzhavna Sigurnost (DS),
314

Dylan, Bob,
271

Eagleburger, Larry,
212

Echelon,
4
–5,
18
,
413

Eddy, Bill,
321

Edison, Thomas,
239

Egypt,
318
–20

Elfman, Mary,
180

Eligible Receiver exercise,
137
–38

Emanuel, Rahm,
174
,
285
,
342
,
356

Emmel, Judy,
64

Enemy of the State,
10

enhanced interrogation techniques (EITs),
173
,
223
,
225
,
237
,
238
,
381
,
386
,
391

Enigma,
33
,
421

Ensor, Kemp,
28

Eshoo, Anna,
226
,
391

espionage,
426
–27

democracy and,
426
–27

George Washington and,
427
,
429
,
431

warfare vs.,
136

Espionage Act,
26
,
125
,
126

EUCOM,
127
,
128

Europe,
413
,
415

European Parliament,
4

European Union (EU),
220
–21

EXCOM,
171

Executive Order 12333,
169
–70

explosively formed projectiles (EFPs),
293

Face the Nation,
425

Fair Game
(Plame),
122

Fakhrizadeh, Mohsen,
308

Family Battle Rhythms,
62

Family Jewels
(Central Intelligence Agency),
120

FARC,
316
,
324
–25

Farkus, Cindy,
27

Faurer, Linc,
131

Federal Bureau of Investigation (FBI),
26
,
34
,
44
,
66
,
74
–76,
85
,
164
,
167
,
278
,
326
,
356
,
360

Federally Administered Tribal Areas (FATA),
335
,
342
,
344
–48

Federal Register,
236

Feinstein, Dianne,
122
,
227
,
234
,
361
,
364
,
391

SSCI report on CIA detention and interrogation program,
396
–402

Fielding, Fred,
355

Fingar, Tom,
162

Finifter, Cindy,
28

First Amendment,
114
,
117
,
125
,
126

Five Eyes,
33
–35

Flynn, Mike
425

Foggo, Kyle Dustin “Dusty,”
179

Fogleman, Ron,
128

Foote, Shelby,
227

Ford, Carl,
50

Ford, Gerald,
157

Fordow,
307
,
308

Foreign Affairs,
129

Foreign Affairs Directorate,
14

Foreign Intelligence Surveillance Act (FISA),
67
–69,
71
,
73
,
77
,
80
–83,
89
,
90
,
96
,
97
,
106
–9,
112
,
177
,
406
,
424

foreign satellite (FORNSAT),
21
–22

Fort Meade,
28
–29,
31
,
40
,
41
,
139
–40

Fourth Amendment,
10
,
68
–69,
82
,
105
,
411
,
413
,
415

Fox News,
382
,
386
,
407
,
408
,
430

Franklin, Benjamin,
36
,
76
,
280

Franks, Tommy,
56
,
57

Freedom Act,
408
n

freedom and liberty,
65
,
76
,
113
,
430

Freedom of Information Act (FOIA),
378
–79,
397

Freeman, Chas,
173

Friday Night Lights
(Bissinger),
375

Friedman, William and Elizebeth,
2
–3

Frist, Tom,
86

G8,
312

G20,
294
,
312

Gaddafi, Muammar,
316
,
431

Gaddafi, Saif al-Islam,
316
,
431

Gates, Bob,
123
,
169
,
176
,
212
,
278
,
303
,
393
,
428

Gaza,
293

Gazprom,
417

GCHQ,
10
,
35
–37,
41
–42,
74

NSA annual meetings with,
36
–37

Gellman, Bart,
403
,
405

General Intelligence Directorate (GID),
322
,
323
,
324

Geneva Conventions,
235
–36,
237

Geocell,
31
,
61

Iraq and,
61

George III, King,
430

George Mason University (GMU),
404
,
426
–28

Georgia,
310
–12

Germany,
26
,
32
,
204
,
219
,
220
,
415
,
417

Bad Aibling Station in,
417
–18

Enigma code of,
33
,
421

Munich Security Conference,
416
–17,
418

globalization,
132

Glomar
defense,
423

Golan Heights,
261

Golden Mosque,
195

BOOK: Playing to the Edge: American Intelligence in the Age of Terror
7.1Mb size Format: txt, pdf, ePub
ads

Other books

Wolver's Reward by Jacqueline Rhoades
Redemption by Lillian Duncan
Fair Maiden by Cheri Schmidt
Allie's Moon by Alexis Harrington
Bowl Full of Cherries by Raine O'Tierney
Ironskin by Tina Connolly