Newton Lee Counterterrorism and Cybersecurity Total Information Awareness Spri
Part I Counterterrorism in Retrospect: Then and Now 1 September 11 Attacks 3 1.1 September 3 Disney's Responses to the Attacks 5 1.3 FBI Warning of Hollywood as a Terrorist Target 7 Hollywood Realism on Terrorism 8 1.5 of Infamy and America at War 9 1.6 September 12 2 U.S. Intelligence Community 15 FBI Ten Most Wanted Fugitive: Osama Bin Laden 15 2.2 An American Hero Bom in Lebanon 2.3 The FBI-CIA Bureaucratic Rivalries 19 2.4 Operational Failures of the U.S. Intelligence Community 20 2.5 Unity of Counterterrorism Effort Across U.S. Government 22 2.6 Transition from to and 23 2.7 Chinese Wall between the CIA and FBI 26 2.8 U.S. Fusion Centers 28 2.9 Hard Lessons from Pearl Harbor and 29 30 Part II Counterterrorism Technologies: Total Information Awareness and Data Mining 3 The Rise and Fall of Total Information Awareness. 3.1 President Ronald Reagan and Admiral John 37 3.2 Defense Advanced Research Projects Agency 38 3.3 Information Awareness Office. 39 3.4 Perception of Privacy 40
3.5 Privacy Protection in Total Information Awareness (TIA) 41 3.6 Opposing Views on TIA 43 3.7 Demystifying IAO and TIA 44 3.8 Demise TIA 46 49 The Afterlife of Total Information Awareness 51 4.1 NSA's Terrorist Surveillance Program 51 4.2 President George W. Bush and NSA Warrantless Wiretapping... 53 4.3 Poindexter's Policy Analysis Market 54 4.4 Project Argus: Bio-Surveillance Priming System 55 4.5 President Barack Obama's Big Data R&D Initiative 56 4.6 CIA's Funded Technologies 56 4.7 Microsoft and NYPD's Domain Awareness System 57 4.8 $2-Billion-Dollar Data-Mining and Spy Center 58 60 Artificial Intelligence and Data Mining 63 5.1 Artificial Intelligence: From Hollywood to the Real World 63 5.2 Intelligent CCTV Cameras 64 5.3 Data Mining in the Age of Big Data 65 5.4 Knowledge Representation, Acquisition, and Inference 67 5.5 Dynamic Mental Models 68 5.6 Modeling Human Problem Solving 69 5.7 Structural Topology and Behavioral Causality 70 5.8 Component Clustering and Decoupling 71 5.9 Analytical Models and Experiential Knowledge 71 5.10 DM 2 Algorithm 72 Applications in Counterterrorism 75 5.12 Massively Multi-Participant Intelligence Amplification 76 77 Part III Counterterrorism Technologies: Social Media and Cybersecurity 6 Social Media and Street of Total Information 83 6.1 It's a Small World, with CCTVs 83 6.2 Facebook Nation: Total Information Awareness 84 6.3 Surveillance Satellites, Tracking Devices, Spy Malware, and Drones 86 6.4 Street of Total Information Awareness 89 6.5 No Doomsday for the Internet 6.6 Web 2.0 for Intelligence Community: Intellipedia, A-Space, Deepnet 92 93
Cyber Warfare: Weapon of Mass Disruption 99 7.1 Weapon of Mass Disruption 99 7.2 Financial Disruption 100 7.3 Infrastructure Disruption 102 7.4 Government and Military Disruption 106 7.5 Counterfeit Parts and Backdoors 108 7.6 Proliferation of Cyber Weapons and Reverse Engineering 109 7.7 Escalation of Cyber Warfare 7.8 Cyber Cold War 7.9 Cyber Terrorism and Digital Pearl Harbor Cyber Attacks, Prevention, and Cybersecurity Acts 8.2 Cybersecurity Initiatives: NICE, Presidential Executive Order 120 8.3 National Cyber Security Awareness Month (NCSAM) 121 8.4 Mitigation from Denial of Service (DoS, DDoS, DRDoS) Attacks 122 8.5 Data Breach Prevention 124 8.6 Fighting Back Against Phishing and Spoofing 8.7 Password Protection and Security Questions 8.8 Software Upgrades and Security Patches 8.9 Fake Software and Free Downloads 8.10 Smartphone Security Protection 132 8.11 Cybersecurity Awareness: Everyone's Responsibility 135 Plan X and Generation Z 143 9.1 Plan X: Foundational Cyberwarfare 143 9.2 Cyber Battlespace Research and Development 9.3 National Centers of Academic Excellence in Cyber Operations... 146 9.4 Generation Z, Teen Hackers, and Girl Coders 146 9.5 Control the Code, Control the World 150 Part Counterterrorism Strategies: Causes and Cures, War and Peace 10 Understanding Terrorism Bravery and Cowardice 10.2 Drones Kill Terrorists, Not Terrorism 10.3 on Terror 160 10.4 A Stubborn Terror 161 10.5 Battle is Economic. Not Military 163
xii Contents 10.6 Inside the Terrorist Mind 164 10.7 Questioning Terrorism and Destroying Stereotypes 168 11 Cures for Terrorism 173 Terrorism as a Disease 173 11.2 "Revenge is Sour": George Orwell 175 "Govern Your Passions or They will be Your Undoing": Mr. Spock 176 "Impossible to Carry a Grudge and a Big Dream at the Same Time" 177 "Every Truth has Two Sides": Aesop 178 "Give Everyone a Voice": Mark Zuckerberg 179 "The Only Security of All is in a Free Press": Thomas Jefferson 181 "Free Speech Would Not Protect a Man Falsely Shouting Fire": Oliver Wendell Holmes, Jr. 183 11.9 of Nonviolent Sharp 185 "We Do Not Have the Right to Resort to Violence When We Don't Get Our Way": President Bill Clinton "Peace is the only path to true security": President Barack 192 192 12 and Peace 197 War as State-Sponsored Terrorism 197 12.2 Complacency in War 199 12.3 Civilians Wanting Peace 200 12.4 Peace Entailing Sacrifice 200 12.5 Peace and Friendships on Facebook and Social Media 203 12.6 Attainable Peace 205 12.7 A Just and Lasting Peace 206 208 About the Author 213 Index 215