Skip to main content

From 1984 to Total Information Awareness

  • Chapter
  • First Online:
Book cover Facebook Nation
  • 3784 Accesses

Abstract

In April 1984, President Ronald Reagan signed the National Security Decision Directive (NSDD) 138: Combating Terrorism, which authorized the increase of intelligence collection directed against groups or states involved in terrorism (1). I was a graduate student at Virginia Tech majoring in computer science with specialization in artificial intelligence (AI).

“Information is the oxygen of the modern age. It seeps through the walls topped by barbed wire, it wafts across the electrified borders, the Goliath of totalitarianism will be brought down by the David of the microchip.”

– President Ronald Reagan (June 1989)

“One of my heroes, Edwin Land of Polaroid, said about the importance of people who could stand at the intersection of humanities and sciences, and I decided that’s what I wanted to do.”

– Apple and Pixar co-founder Steve Jobs (2009)

“We exist at the intersection of technology and social issues.”

– Facebook CEO Mark Zuckerberg (September 2011)

“It’s important to recognize that you can’t have 100% security and also then have 100% privacy and zero inconvenience.”

– President Barack Obama (June 2013)

“Understanding who you serve is always a very important problem, and it only gets harder the more people that you serve.”

– Facebook CEO Mark Zuckerberg (April 2014)

“The NSA might still be watching us. But now we can watch them.”

– Rep. Jim Sensenbrenner (May 2014)

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. United States White House Office. National Security Decision Directive 138: Combating Terrorism. [Online] Homeland Security Digital Library, April 26, 1984. https://www.hsdl.org/?abstract&did=440725.

  2. Institute for Defense Analyses. IDA’s History and Mission. [Online] IDA. [Cited: January 1, 2002.] https://www.ida.org/aboutus/historyandmission.php.

  3. Ada Joint Program Office. Military Standard Common APSE (Ada Programming Support Environment) Interface Set (CAIS). [Online] Defense Technical Information Center, 1985. http://books.google.com/books/about/Military_Standard_Common_APSE_Ada_Progra.html?id=EjEYOAAACAAJ.

  4. Carik, Kenneth. The Nature of Explanation. [Online] Cambridge University Press, 1943. http://www.cambridge.org/us/knowledge/isbn/item1121731/.

  5. Minsky, Marvin. A Framework for Representing Knowledge. [Online] MIT AI Laboratory Memo 306, June 1974. http://web.media.mit.edu/~minsky/papers/Frames/frames.html.

  6. Simonite, Tom. Software Mines Science Papers to Make New Discoveries. [Online] MIT Technology Review, November 25, 2013. http://www.technologyreview.com/news/520461/software-mines-science-papers-to-make-new-discoveries/.

  7. Lee, Newton S. DM2: an algorithm for diagnostic reasoning that combines analytical models and experiential knowledge. [Online] International Journal of Man-Machine Studies (Volume 28, Issue 6, pp. 643-670), June 1988. http://www.sciencedirect.com/science/article/pii/S002073738880066X.

  8. Berwaner, Mary. The Problem of Diagnostic Aiding. [Online] The Defense Technical Information Center, October 30, 1989. www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA239200.

  9. Mackey, Maureen. Steve Jobs: 10 Revealing Quotes from His Biography. [Online] The Fiscal Times, October 24, 2011. http://www.thefiscaltimes.com/Articles/2011/10/24/Steve-Jobs-10-Revealing-Quotes-from-His-Biography.

  10. Lee, Newton S. InfoStation: A multimedia access system for library automation. [Online] The Electronic Library. (Volume 8, Issue 6, pp. 415-421.), November 1990. http://www.emeraldinsight.com/journals.htm?articleid=1667862.

  11. Berners-Lee, Tim. The WorldWideWeb browser. World Wide Web Consortium (W3C). [Online] [Cited: January 1, 2012.] http://www.w3.org/People/Berners-Lee/WorldWideWeb.html.

  12. McCarthy, Shawn. Next’s OS finally is maturing. (NextStep Unix operating system). [Online] Government Computer News, March 6, 1995. http://business.highbeam.com/436948/article-1G1-16723518/next-os-finally-maturing.

  13. Lee, Newton and Madej, Krystina. Disney Stories: Getting to Digital. [Online] Springer Science+Business Media, April 27, 2012. http://www.amazon.com/Disney-Stories-Getting-Newton-Lee/dp/1461421004.

  14. Wilson, James M. V. Statement by James M. Wilson V, MD, Research Faculty at Georgetown University, before the Senate Homeland Security & the Federal Workforce, and the District of Columbia. [Online] The U.S. Senate, October 4, 2007. http://www.hsgac.senate.gov//imo/media/doc/WilsonTestimony.pdf.

  15. U.S. News & World Report. Q&A: DNI Chief Scientist Eric Haseltine. [Online] U.S. News & World Report. [Cited: November 3, 2006.] http://www.usnews.com/usnews/news/articles/061103/3qahaseltine_print.htm.

  16. Tether, Tony. Statement by Dr. Tony Tether, Director of Defense Advanced Research Projects Agency, submitted to the United States Senate Armed Services Committee. [Online] The U.S. Senate, April 10, 2002. http://armed-services.senate.gov/statemnt/2002/April/Tether.pdf.

  17. Markoff, John. THREATS AND RESPONSES: INTELLIGENCE; Pentagon Plans a Computer System That Would Peek at Personal Data of Americans. [Online] The New York Times, November 9, 2002. http://www.nytimes.com/2002/11/09/us/threats-responses-intelligence-pentagon-plans-computer-system-that-would-peek.html.

  18. Tether, Tony. Statement by Dr. Tony Tether, Director of Defense Advanced Research Projects Agency, submitted to the U.S. House of Representatives. [Online] Defense Advanced Research Projects Agency, March 27, 2003. http://www.darpa.mil/WorkArea/DownloadAsset.aspx?id=1778.

  19. Defense Advanced Research Projects Agency. Report to Congress regarding the Terrorism Information Awareness Program. [Online] Electronic Privacy Information Center, May 20, 2003. http://epic.org/privacy/profiling/tia/may03_report.pdf.

  20. 108th Congress. House Report 108-283 - MAKING APPROPRIATIONS FOR THE DEPARTMENT OF DEFENSE FOR THE FISCAL YEAR ENDING SEPTEMBER 30, 2004, AND FOR OTHER PURPOSES. [Online] The Library of Congress, 2003. http://thomas.loc.gov/cgi-bin/cpquery/?&sid=cp108alJsu&refer=&r_n=hr283.108&db_id=108&item=&&sid=cp108alJsu&r_n=hr283.108&dbname=cp108&&sel=TOC_309917&.

  21. FBI National Press Office. FBI Announces Contract Award for Next Generation Identification System. [Online] Federal Bureau of Investigation, February 12, 2008. http://www.fbi.gov/news/pressrel/press-releases/fbi-announces-contract-award-for-next-generation-identification-system.

  22. Cratty, Carol. Lockheed gets $1 billion FBI contract. [Online] CNN, February 13, 2008. http://edition.cnn.com/2008/TECH/02/13/fbi.biometrics/index.html.

  23. Gorman, Siobhan. NSA’s Domestic Spying Grows As Agency Sweeps Up Data: Terror Fight Blurs Line Over Domain; Tracking Email. [Online] The Wall Street Journal, March 10, 2008. http://online.wsj.com/article/SB120511973377523845.html.

  24. American Civil Liberties Union. Stunning New Report on Domestic NSA Dragnet Spying Confirms ACLU Surveillance Warnings. [Online] ACLU, March 12, 2008. http://www.aclu.org/technology-and-liberty/stunning-new-report-domestic-nsa-dragnet-spying-confirms-aclu-surveillance-wa.

  25. Wright, Lawrence. The Spymaster. Can Mike McConnell fix America’s intelligence community? [Online] The New Yorker, January 21, 2008. http://www.newyorker.com/reporting/2008/01/21/080121fa_fact_wright?currentPage=all.

  26. National Science Foundation. NSF and the Birth of the Internet. [Online] The National Science Foundation. [Cited: August 7, 2014.] http://www.nsf.gov/news/special_reports/nsf-net/home.jsp.

  27. Kalil, Tom. Big Data is a Big Deal. [Online] The White House, March 29, 2012. http://www.whitehouse.gov/blog/2012/03/29/big-data-big-deal.

  28. Information Innovation Office. I2O Focus Area. [Online] DARPA. [Cited: April 3, 2012.] http://www.darpa.mil/Our_Work/I2O/.

  29. Office of Science and Technology Policy, Executive Office of the President. Obama Administration Unveils “Big Data” Initiative: Announces $200 Million In New R&D Investments. [Online] The White House, March 29, 2012. http://www.whitehouse.gov/sites/default/files/microsites/ostp/big_data_press_release.pdf.

  30. Executive Office of the President. Big Data Across the Federal Government. [Online] The White House, March 29, 2012. http://www.whitehouse.gov/sites/default/files/microsites/ostp/big_data_fact_sheet_final_1.pdf.

  31. Young, Denise. Letitia Long: A Global Vision. Alumna leads intelligence agency in new era of collaboration. [Online] Virginia Tech Magazine, Spring 2012. http://www.vtmag.vt.edu/spring12/letitia-long.html.

  32. Gidda, Mirren. Edward Snowden and the NSA files – timeline. [Online] The Guardian, July 25, 2013. http://www.theguardian.com/world/2013/jun/23/edward-snowden-nsa-files-timeline.

  33. theguardian.com. Verizon forced to hand over telephone data – full court ruling. [Online] The Guardian, June 5, 2013. http://www.theguardian.com/world/interactive/2013/jun/06/verizon-telephone-data-court-order.

  34. Greenwald, Glenn and MacAskill, Ewen. NSA Prism program taps in to user data of Apple, Google and others. [Online] The Guardian, June 6, 2013. http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data.

  35. Jackson, David. Obama defends surveillance programs. [Online] USA Today, June 7, 2013. http://www.usatoday.com/story/news/politics/2013/06/07/obama-clapper-national-security-agency-leaks/2400405/.

  36. Nakashima, Ellen and Warrick, Joby. For NSA chief, terrorist threat drives passion to ‘collect it all’. [Online] The Washington Post, July 14, 2013. http://www.washingtonpost.com/world/national-security/for-nsa-chief-terrorist-threat-drives-passion-to-collect-it-all/2013/07/14/3d26ef80-ea49-11e2-a301-ea5a8116d211_story.html.

  37. Perez, Evan. Documents shed light on U.S. surveillance programs. [Online] CNN, August 9, 2013. http://www.cnn.com/2013/08/09/politics/nsa-documents-scope/index.html.

  38. Ohlheiser, Abby. Edward Snowden Would ‘Like to Go Home’. [Online] The Wire, May 28, 2014. http://www.thewire.com/national/2014/05/edward-snowden-would-like-to-go-home/371784/.

  39. Editorial Board. Plugging the leaks in the Edward Snowden case. [Online] The Washington Post, July 1, 2013. http://www.washingtonpost.com/opinions/how-to-keep-edward-snowden-from-leaking-more-nsa-secrets/2013/07/01/4e8bbe28-e278-11e2-a11e-c2ea876a8f30_story.html.

  40. Borger, Julian. NSA files: why the Guardian in London destroyed hard drives of leaked files. [Online] The Guardian, August 20, 2013. http://www.theguardian.com/world/2013/aug/20/nsa-snowden-files-drives-destroyed-london.

  41. Poulsen, Kevin. Snowden’s e-mail provider shuts down amid court battle. [Online] August 9, 2013. http://www.cnn.com/2013/08/09/tech/web/snowden-email-lavabit/index.html.

  42. Edwards-Levy, Ariel and Freeman, Sunny. Americans Still Can’t Decide Whether Edward Snowden Is A ‘Traitor’ Or A ‘Hero,’ Poll Finds. [Online] The Huffington Post, October 30, 2013. http://www.huffingtonpost.com/2013/10/30/edward-snowden-poll_n_4175089.html.

  43. Smith, Matt. NSA leaker comes forward, warns of agency’s ‘existential threat’. [Online] CNN, June 9, 2013. http://www.cnn.com/2013/06/09/politics/nsa-leak-identity/index.html.

  44. NBC News. Inside the Mind of Edward Snowden. [Online] NBC News, May 28, 2014. http://www.nbcnews.com/feature/edward-snowden-interview/snowden-being-patriot-means-knowing-when-protect-your-country-n117151.

  45. RT News. WikiLeaks revelations only tip of iceberg – Assange. [Online] RT News, May 2, 2011. http://www.rt.com/news/wikileaks-revelations-assange-interview/.

  46. Taylor, Chris. Through a PRISM, Darkly: Tech World’s $20 Million Nightmare. [Online] Mashable, June 6, 2013. http://mashable.com/2013/06/06/through-a-prism-darkly-techs-20-million-nightmare-is-our-fault/.

  47. Fitzpatrick, Alex. Facebook, Google, Apple, Yahoo Make Similar PRISM Denials. [Online] Mashable, June 6, 2013. http://mashable.com/2013/06/06/facebook-google-apple-prism/#.

    Google Scholar 

  48. National Security Agency. Our History Video Transcript. [Online] National Security Agency, January 15, 2009. http://www.nsa.gov/public_info/speeches_testimonies/nsa_videos/history_of_nsa.shtml.

  49. Glass, Nick and Ponsford, Matthew. The secret military tech inside household robot vacuum cleaner. [Online] CNN, March 31, 2014. http://www.cnn.com/2014/03/31/tech/innovation/the-secret-military-technology-roomba-vacuum/index.html.

  50. Bosker, Bianca. Facebook’s f8 Conference (LIVE BLOG): Get The Latest Facebook News. [Online] The Huffington Post, September 22, 2011. http://www.huffingtonpost.com/2011/09/22/facebook-f8-conference-live-blog-latest-news_n_975704.html.

  51. Zuckerberg, Mark. I want to respond personally to the outrageous press reports about PRISM. [Online] Facebook, June 7, 2013. https://www.facebook.com/zuck/posts/10100828955847631.

  52. CNBC. Apple to @CNBC. [Online] Twitter, June 6, 2013. https://twitter.com/CNBC/status/342778613264945152.

  53. Apple. Report on Government Information Requests. [Online] Apple, November 5, 2013. https://www.apple.com/pr/pdf/131105reportongovinforequests3.pdf.

  54. Stretch, Colin. Facebook Releases New Data About National Security Requests. [Online] Facebook Newsroom, February 3, 2014. http://newsroom.fb.com/news/2014/02/facebook-releases-new-data-about-national-security-requests/.

  55. Salgado, Richard. Shedding some light on Foreign Intelligence Surveillance Act (FISA) requests. [Online] Google Official Blog, February 4, 2014. http://googleblog.blogspot.com/2014/02/shedding-some-light-on-foreign.html.

  56. Rottenberg, Erika. Updated LinkedIn Transparency Report: Including Requests Related to U.S. National Security-Related Matters. [Online] LinkedIn Official Blog, February 3, 2014. http://blog.linkedin.com/2014/02/03/updated-linkedin-transparency-report-including-requests-related-to-u-s-national-security-related-matters/.

  57. Smith, Brad. Providing additional transparency on US government requests for customer data. [Online] Microsoft TechNet, February 3, 2014. http://blogs.technet.com/b/microsoft_on_the_issues/archive/2014/02/03/providing-additional-transparency-on-us-government-requests-for-customer-data.aspx.

  58. Bell, Ron and Altschuler, Aaron. More Transparency For U.S. National Security Requests. [Online] Yahoo, February 3, 2014. http://yahoo.tumblr.com/post/75496314481/more-transparency-for-u-s-national-security-requests.

  59. Gustin, Sam. Tech companies jockey to seem the most transparent. [Online] CNN, June 18, 2013. http://www.cnn.com/2013/06/18/tech/web/tech-companies-data-transparent/index.html.

  60. TechCrunch. Marissa Mayer Comments on the NSA | Disrupt SF 2013. [Online] TechCrunch, September 11, 2013. http://www.youtube.com/watch?v=gS78slU6kq8.

  61. Gellman, Barton and Soltani, Ashkan. NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say. [Online] The Washiongton Post, October 30, 2013. http://www.washingtonpost.com/world/national-security/nsa-infiltrates-links-to-yahoo-google-data-centers-worldwide-snowden-documents-say/2013/10/30/e51d661e-4166-11e3-8b74-d89d714ca4dd_story.html.

  62. Neal, Ryan W. Edward Snowden Reveals ‘Quantum Insert’: NSA And GCHQ Used Fake LinkedIn And Slashdot Pages To Install Spyware. [Online] International Business Times, November 11, 2013. http://www.ibtimes.com/edward-snowden-reveals-quantum-insert-nsa-gchq-used-fake-linkedin-slashdot-pages-install-spyware.

  63. Kelly, Meghan. Wickr cofounder to give Reddit AMA on what it’s like to be bullied by the FBI. [Online] Venture Beat, January 10, 2014. http://venturebeat.com/2014/01/10/nico-sell-ama/.

  64. Pagliery, Jose. Google tries to NSA-proof Gmail. [Online] CNNMoney, March 21, 2014. http://money.cnn.com/2014/03/20/technology/security/gmail-nsa/index.html.

  65. Mayer, Marissa. Our Commitment to Protecting Your Information. [Online] Yahoo!, November 18, 2013. http://yahoo.tumblr.com/post/67373852814/our-commitment-to-protecting-your-information.

  66. Smith, Brad. Protecting customer data from government snooping. [Online] Microsoft Blogs, December 4, 2013. http://blogs.technet.com/b/microsoft_blog/archive/2013/12/04/protecting-customer-data-from-government-snooping.aspx.

  67. Pagliery, Jose. Mark Zuckerberg calls Obama to complain about NSA. [Online] CNNMoney, March 14, 2014. http://money.cnn.com/2014/03/13/technology/security/mark-zuckerberg-nsa/index.html.

  68. Mascaro, Lisa. House overwhelmingly approves bill to curb NSA domestic spying. [Online] Los Angeles Times, May 22, 2014. http://www.latimes.com/nation/politics/la-na-nsa-reforms-20140523-story.html.

  69. Yadron, Danny. Ex-NSA Official Inglis Warns Tech Firms: Be Transparent. [Online] The Wall Street Journal, March 5, 2014. http://online.wsj.com/news/articles/SB10001424052702304732804579421733369167364.

  70. Manjoo, Farhad. Can Facebook Innovate? A Conversation With Mark Zuckerberg. [Online] The New York Times, April 16, 2014. http://bits.blogs.nytimes.com/2014/04/16/can-facebook-innovate-a-conversation-with-mark-zuckerberg/.

  71. Reform Government Surveillance. Reform Government Surveillance. [Online] ReformGovernmentSurveillance.com, June 2014. https://www.reformgovernmentsurveillance.com/USAFreedomAct.

  72. Fight for the Future. Privacy Pack. [Online] Reset the Net, June 5, 2014. https://pack.resetthenet.org/.

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer Science+Business Media New York

About this chapter

Cite this chapter

Lee, N. (2014). From 1984 to Total Information Awareness. In: Facebook Nation. Springer, New York, NY. https://doi.org/10.1007/978-1-4939-1740-2_1

Download citation

  • DOI: https://doi.org/10.1007/978-1-4939-1740-2_1

  • Published:

  • Publisher Name: Springer, New York, NY

  • Print ISBN: 978-1-4939-1739-6

  • Online ISBN: 978-1-4939-1740-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics